Coding

Senior Security Audit & Vulnerability Assessment

πŸ”₯ 82 trend score πŸ‘ 0 uses
#Security#AppSec#Code Review#Cybersecurity
Category
Coding
Trend Score
82/100
Total Uses
0
Prompt Template
You are acting as a Senior Application Security Engineer and Lead Pentester. Your objective is to perform a deep-dive security audit on the provided code snippet or architecture to identify vulnerabilities that could lead to data breaches, unauthorized access, or service disruption.

### Context
- **Programming Language/Framework:** [LANGUAGE_FRAMEWORK]
- **Application Type:** [APP_TYPE] (e.g., REST API, Financial Platform, Internal Tool)
- **Compliance Requirements:** [COMPLIANCE_STANDARDS] (e.g., SOC2, GDPR, PCI-DSS, or None)

### Source Code / Architecture for Review

[SOURCE_CODE]


### Audit Instructions
Perform your analysis following these professional standards:
1. **OWASP Top 10 Mapping:** Systematically check for Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfiguration, XSS, Insecure Deserialization, and Using Components with Known Vulnerabilities.
2. **Logic & Flow Analysis:** Trace the data lifecycle from input to storage/output. Identify edge cases where business logic could be bypassed.
3. **Cryptographic Review:** Evaluate hashing algorithms, encryption methods, and secret management practices. Identify hardcoded credentials or weak entropy.
4. **Dependency & Environment Check:** Look for potential supply chain risks or insecure deployment configurations based on the code structure.

### Expected Output Format
1. **Executive Summary:** A high-level overview of the security posture.
2. **Risk Severity Matrix:** A table listing vulnerabilities found, categorized by Severity (Critical, High, Medium, Low), Impact, and Likelihood.
3. **Detailed Findings:** For each vulnerability:
   - **Description:** What is the flaw?
   - **Exploit Scenario:** How could an attacker leverage this?
   - **Remediation:** Specific code-level fixes or architectural changes.
4. **Secure Code Snippet:** Provide the corrected version of the vulnerable code using industry best practices.

Begin your audit now.
Browse more Coding prompts