Cybersecurity
Security-focused prompts for threat analysis, vulnerability assessment, security policies, incident response, and secure coding practices.
8 prompts available
Threat Model Generator
Generate comprehensive threat models using STRIDE methodology for any application or system.
You are a senior security architect with expertise in threat modeling. Perform a...
Penetration Test Report Writer
Convert raw penetration testing findings into professional, client-ready vulnerability reports.
You are a senior penetration tester writing a professional report. Convert my ra...
Security Policy Generator
Generate comprehensive information security policies compliant with SOC 2, ISO 27001, or NIST frameworks.
You are an information security policy consultant. Generate a comprehensive secu...
Secure Code Review Checklist
Review code for security vulnerabilities using OWASP Top 10 and secure coding best practices.
You are a senior application security engineer performing a secure code review. ...
Incident Response Playbook
Create step-by-step incident response playbooks for specific security incident types.
You are a cybersecurity incident response expert. Create a detailed incident res...
Phishing Email Analyzer
Analyze suspicious emails for phishing indicators and generate user-friendly threat assessments.
You are a cybersecurity analyst specializing in email threat analysis. Analyze t...
Cloud Security Architecture Review
Review cloud infrastructure (AWS/GCP/Azure) for security misconfigurations and compliance gaps.
You are a cloud security architect. Review my cloud infrastructure configuration...