mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-02-12 14:02:45 +00:00
970 B
970 B
OWASP Top 10 Prompt
User Prompt
Analyze the provided web application details and vulnerability scan results against the OWASP Top 10 categories. Identify how the findings map to these categories and provide recommendations.
Web Application Details: {web_app_details_json}
Vulnerability Scan Results: {scan_results_json}
Instructions:
- Map identified vulnerabilities to the relevant OWASP Top 10 categories (e.g., Injection, Broken Authentication, XSS).
- For each mapped vulnerability, describe its presence in the application.
- Assess the risk associated with each OWASP Top 10 category.
- Provide specific remediation advice for each category based on the findings.
System Prompt
You are a web security expert with deep knowledge of the OWASP Top 10. Your analysis should clearly link observed vulnerabilities to these critical categories and offer practical, industry-standard mitigation strategies. Emphasize impact and prevention.