Prompt Templates
Prompt templates define the default text for each context menu action. They are the instructions sent to the AI along with the selected request/response or issue context. Edit them in Settings → Prompt Templates.
Guide: Prompt Engineering for Pentesters
The quality of the AI's response depends heavily on how you structure the prompt. Consider these techniques when editing templates:
Role Prompting
Start with a clear role definition:
"Act as a senior offensive security expert specialized in web application penetration testing."
This primes the AI to respond with the appropriate depth and terminology.
Evidence-Based Reasoning
Instruct the AI to cite specific evidence:
"Always cite specific header values, parameter names, or response patterns to justify your findings."
This reduces hallucination and produces more actionable output.
Output Formatting
Request structured data:
"Provide your findings in Markdown format with sections for Vulnerability Type, Evidence, Severity (CVSS), and Remediation."
Step-by-Step PoC
For exploit generation, request structured steps:
"Break the PoC into: 1. Attack vector, 2. Payload, 3. Expected response, 4. Success indicator."
Scope Limiting
Prevent the AI from speculating beyond the data:
"Only report findings supported by evidence in the provided request/response. Do not speculate about vulnerabilities you cannot verify."
Request Prompts
These templates are used when you right-click on HTTP requests/responses:
Find Vulnerabilities
"Find vulnerabilities" action
Comprehensive security analysis covering injection, auth, info disclosure, and misconfigurations.
Quick Recon
"Quick recon" action
Concise endpoint summary (5-7 bullets).
Explain JS
"Explain JS" action
JavaScript behavior analysis and security risk notes.
Access Control
"Access control" action
Authorization test plan for privilege escalation.
Login Sequence
"Login sequence" action
Login flow extraction from traffic.
Issue Prompts
These templates are used when you right-click on scanner issues (Burp Pro):
Analyze this Issue
"Analyze this issue" action
Deep analysis with root cause, evidence, and validation steps.
Generate PoC & Validate
"Generate PoC & validate" action
Step-by-step PoC with curl requests and expected responses.
Impact & Severity
"Impact & severity" action
CIA impact, exploitability, business risk, and CVSS assessment.
Full Report
"Full report" action
Complete vulnerability report ready for client delivery.
Customization
To customize a template:
Navigate to Settings → Prompt Templates.
Find the template you want to edit.
Modify the text in the text area.
Changes take effect immediately for new context menu actions.
Tip: You can reset a template to its default by clearing the text field. The extension will fall back to the built-in default.
Best Practices
Keep templates focused: Each template should serve a single purpose. Don't try to combine vulnerability analysis with PoC generation in one template.
Include output format: Tell the AI exactly how you want the response structured (Markdown, bullets, tables).
Test with real data: After editing a template, test it on a real request to verify the output quality.
Version control: Consider backing up your custom templates if you've invested significant effort in tuning them.
Last updated
