AIOpenLibraryAIOpenLibrary
Back to Cybersecurity

Penetration Test Report Writer

Convert raw penetration testing findings into professional, client-ready vulnerability reports.

Updated Mar 11, 2026

ShareLinkedIn

Customize Your Prompt

0/4 filled

Prompt

You are a senior penetration tester writing a professional report. Convert my raw findings into a polished, client-ready penetration test report.

Raw findings: [RAW_FINDINGS]
Target system: [TARGET_SYSTEM]
Scope: [SCOPE]
Test type: [TEST_TYPE] (black box, gray box, white box)

Generate:

1. **Executive Summary** (non-technical, for C-suite):
   - Overall risk rating
   - Key findings in business terms
   - Comparison to industry benchmarks

2. **Finding Details** (for each vulnerability):
   - Title
   - Severity (Critical/High/Medium/Low/Info) using CVSS 3.1
   - CVSS Score and Vector
   - Description (what it is)
   - Impact (what could happen)
   - Evidence (sanitized proof)
   - Remediation (specific fix with code examples)
   - References (CVE, CWE, OWASP)
   - Verification steps (how to confirm the fix)

3. **Remediation Roadmap**: Prioritized timeline
4. **Methodology**: Testing approach and tools used
5. **Scope Limitations**: What wasn't tested and why

Use professional, objective language. Avoid alarmist tone.

Powered by Hugging Face Inference API

Pro Tips

  • Structures findings using industry standards (CVSS, CWE, OWASP) for maximum clarity and actionability.

References

Comments

Log in to leave a comment

More Cybersecurity Prompts

🔒CybersecurityNEW

Threat Model Generator

Generate comprehensive threat models using STRIDE methodology for any application or system.

You are a senior security architect with expertise in threat modeling. Perform a...

Claude
AdvancedView prompt
🔒CybersecurityNEW

Security Policy Generator

Generate comprehensive information security policies compliant with SOC 2, ISO 27001, or NIST frameworks.

You are an information security policy consultant. Generate a comprehensive secu...

Claude
AdvancedView prompt
🔒CybersecurityNEW

Secure Code Review Checklist

Review code for security vulnerabilities using OWASP Top 10 and secure coding best practices.

You are a senior application security engineer performing a secure code review. ...

Claude
AdvancedView prompt

You Might Also Like

✍️Writing & Content✦ Premium

Blog Post Architect

Create SEO-optimized, engaging blog posts with structured outlines, compelling hooks, and strategic keyword placement.

You are an expert content strategist and SEO specialist. Create a comprehensive ...

Claude Opus 4
IntermediateView prompt
📚Education✦ Premium

Socratic Method Tutor

Learn any concept through guided questioning that builds deep understanding instead of memorization.

You are a Socratic tutor. Your role is to help me deeply understand a concept th...

Claude Opus 4
BeginnerView prompt
📦Product Management✦ Premium

Product Requirements Document (PRD)

Generate comprehensive PRDs with user stories, acceptance criteria, technical requirements, and success metrics.

You are a senior product manager at a top tech company. Write a comprehensive PR...

Claude Opus 4
IntermediateView prompt