AIOpenLibraryAIOpenLibrary
Back to Cybersecurity

Phishing Email Analyzer

Analyze suspicious emails for phishing indicators and generate user-friendly threat assessments.

Updated Mar 11, 2026

ShareLinkedIn

Customize Your Prompt

0/3 filled

Prompt

You are a cybersecurity analyst specializing in email threat analysis. Analyze this suspicious email for phishing indicators.

Email headers/content:
[EMAIL_CONTENT]

Sender info: [SENDER_INFO]
Received by: [RECIPIENT_CONTEXT]

Perform analysis:

1. **Verdict**: 🔴 Phishing / 🟡 Suspicious / 🟢 Likely Legitimate
2. **Confidence**: High/Medium/Low

3. **Red Flags Identified**:
   - Sender domain analysis (legitimate vs. lookalike)
   - URL analysis (hover-over vs. displayed text)
   - Urgency/pressure tactics
   - Grammar/spelling anomalies
   - Attachment analysis
   - Header spoofing indicators
   - Brand impersonation signs

4. **Technical Indicators**:
   - SPF/DKIM/DMARC alignment
   - Reply-to vs. From mismatch
   - Suspicious URLs (shortened, recently registered domains)
   - Encoded/obfuscated content

5. **Risk Assessment**: What could happen if someone clicked/responded

6. **Recommended Actions**:
   - Immediate steps for the recipient
   - IT/Security team actions
   - Whether to report to anti-phishing services

7. **User-Friendly Explanation**: Non-technical summary for the person who received it

Powered by Hugging Face Inference API

Pro Tips

  • Systematic analysis catches subtle phishing indicators that users commonly miss.

References

Comments

Log in to leave a comment

More Cybersecurity Prompts

🔒CybersecurityNEW

Threat Model Generator

Generate comprehensive threat models using STRIDE methodology for any application or system.

You are a senior security architect with expertise in threat modeling. Perform a...

Claude
AdvancedView prompt
🔒CybersecurityNEW

Penetration Test Report Writer

Convert raw penetration testing findings into professional, client-ready vulnerability reports.

You are a senior penetration tester writing a professional report. Convert my ra...

🔒CybersecurityNEW

Security Policy Generator

Generate comprehensive information security policies compliant with SOC 2, ISO 27001, or NIST frameworks.

You are an information security policy consultant. Generate a comprehensive secu...

Claude
AdvancedView prompt

You Might Also Like

✍️Writing & Content✦ Premium

Blog Post Architect

Create SEO-optimized, engaging blog posts with structured outlines, compelling hooks, and strategic keyword placement.

You are an expert content strategist and SEO specialist. Create a comprehensive ...

Claude Opus 4
IntermediateView prompt
📚Education✦ Premium

Socratic Method Tutor

Learn any concept through guided questioning that builds deep understanding instead of memorization.

You are a Socratic tutor. Your role is to help me deeply understand a concept th...

Claude Opus 4
BeginnerView prompt
📦Product Management✦ Premium

Product Requirements Document (PRD)

Generate comprehensive PRDs with user stories, acceptance criteria, technical requirements, and success metrics.

You are a senior product manager at a top tech company. Write a comprehensive PR...

Claude Opus 4
IntermediateView prompt