Prompt Defaults
These are the default prompt templates used for the context menu actions. You can customize these in Settings → Prompt Templates.
Request-Based Prompts
Find Vulnerabilities
Analyze this HTTP request/response for security vulnerabilities. Check for: injection points (SQLi, XSS, CMDI, SSTI, SSRF), authentication/authorization flaws (IDOR, BOLA, BAC), information disclosure, insecure headers/cookies, sensitive data exposure, misconfigurations. For each finding provide: vulnerability type, evidence, severity (CVSS), exploitation steps, and remediation.
Quick Recon
Summarize this endpoint for recon: HTTP method, path, authentication mechanism, all parameters (query/body/headers/cookies), response data type and key fields, notable security observations. Format: 5-7 concise bullets.
Explain JS
Summarize JS behavior and any security impact. Output: bullets + 1 risk note.
Access Control
Design an access-control test plan for this request: horizontal/vertical escalation, missing authorization checks, auth bypass. For each test, give the modified request and expected outcome.
Login Sequence
Draft a login sequence from this traffic. Output: steps + parameters to capture.
Issue-Based Prompts
Analyze this Issue
Analyze the finding. Explain the vulnerability and root cause, cite concrete evidence from the request/response, and list precise validation steps.
Generate PoC & Validate
Provide a step-by-step PoC with exact HTTP requests (curl where possible), expected responses, and safe validation criteria.
Impact & Severity
Assess impact and severity: CIA impact, exploitability, likely business risk, and CVSS considerations. Keep it concise.
Full Report
Write a complete vulnerability report: summary, root cause, evidence, impact, PoC, remediation.
Last updated
