mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-02-12 22:12:45 +00:00
19 lines
970 B
Markdown
19 lines
970 B
Markdown
# OWASP Top 10 Prompt
|
|
|
|
## User Prompt
|
|
Analyze the provided web application details and vulnerability scan results against the OWASP Top 10 categories. Identify how the findings map to these categories and provide recommendations.
|
|
|
|
**Web Application Details:**
|
|
{web_app_details_json}
|
|
|
|
**Vulnerability Scan Results:**
|
|
{scan_results_json}
|
|
|
|
**Instructions:**
|
|
1. Map identified vulnerabilities to the relevant OWASP Top 10 categories (e.g., Injection, Broken Authentication, XSS).
|
|
2. For each mapped vulnerability, describe its presence in the application.
|
|
3. Assess the risk associated with each OWASP Top 10 category.
|
|
4. Provide specific remediation advice for each category based on the findings.
|
|
|
|
## System Prompt
|
|
You are a web security expert with deep knowledge of the OWASP Top 10. Your analysis should clearly link observed vulnerabilities to these critical categories and offer practical, industry-standard mitigation strategies. Emphasize impact and prevention. |