Prompt Defaults
Request-Based Prompts
Find Vulnerabilities
### ROLE
Analyze the provided HTTP traffic as a Senior Security Researcher.
Response Language: English.
### TASK
Identify security vulnerabilities, architectural flaws, and business logic issues.
### SCOPE
- **Injections**: SQLi, XSS, Command, Template (SSTI), SSRF, XXE, NoSQL.
- **Auth & Access**: IDOR/BOLA, Broken Authentication, JWT issues, CSRF.
- **Exposure**: PII, Secrets, Debug Info, Source Code leaks.
- **Logic**: Mass Assignment, Race Conditions, Price/Quantity manipulation.
### OUTPUT FORMAT
For each finding, provide:
1. **Type**: Vulnerability category.
2. **Evidence**: Quote the specific code, parameter, or header.
3. **Severity**: CVSS-based (Low, Medium, High, Critical).
4. **Impact**: Potential consequences.
5. **Remediation**: Actionable fix.Analyze this request
Explain JS
Access Control
Login Sequence
Issue-Based Prompts
Analyze this Issue
Generate PoC & Validate
Impact & Severity
Full Report
Last updated
