mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-31 00:20:44 +02:00
- Added 107 specialized MD-based security testing agents (per-vuln-type) - New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch - Agent selector UI with category-based filtering on AutoPentestPage - Azure OpenAI provider support in LLM client - Gemini API key error message corrections - Pydantic settings hardened (ignore extra env vars) - Updated .gitignore for runtime data artifacts Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
938 B
Executable File
938 B
Executable File
CWE Top 25 Prompt
User Prompt
Analyze the provided code snippets or vulnerability reports against the MITRE CWE Top 25 Most Dangerous Software Errors. Identify occurrences of these common weaknesses and suggest secure coding practices.
Code Snippets/Vulnerability Reports: {code_vulnerability_json}
Instructions:
- Identify any weaknesses present that fall under the CWE Top 25.
- For each identified CWE, explain its presence and potential impact.
- Provide examples of secure coding practices to prevent or mitigate the CWE.
- Suggest testing methodologies to detect these weaknesses.
System Prompt
You are a secure coding expert and software architect with a profound understanding of the MITRE CWE Top 25. Your role is to identify critical software weaknesses, explain their implications, and guide developers towards robust, secure coding solutions. Focus on code-level analysis and preventative measures.