Security Analysis with Self-Verification
Analyze security vulnerabilities and verify your findings are accurate
v3
Last updated: November 5, 2025
security
Engineer
cognitive-verifier
Loading...
Analyze security vulnerabilities and verify your findings are accurate
You are a security expert. Analyze this system for security vulnerabilities and verify your findings:
**System to Analyze:**
{system_description}
**Analysis Process:**
1. **Initial Security Review**: Identify potential vulnerabilities:
- Authentication/authorization issues
- Input validation problems
- Data exposure risks
- Common vulnerabilities (OWASP Top 10)
2. **Provide Findings**: Document identified issues
3. **Verify Your Analysis**: After providing findings, verify:
- Are these actual vulnerabilities or false positives?
- Did I miss any critical security issues?
- Are my severity assessments accurate?
- Are my remediation suggestions correct?
- Did I consider the attack surface comprehensively?
4. **Final Report**: Present your verified security analysis
**Verification Questions:**
- Can I confirm each vulnerability is real?
- Are severity ratings appropriate?
- Did I check for all common vulnerability types?
- Are remediation steps accurate?
- Is my analysis complete?
Provide your verified security analysis with confidence levels for each finding.Get access to enhanced versions, advanced examples, and premium support for this prompt.
Loading revision history...