Skip to content

SecurityAudit Decorator

Performs security-focused analysis following industry standards.

Category: Testing And Debugging

Parameters

Parameter Type Description Default
standard enum Security standard to follow owasp-top10
risk-level enum Sensitivity for flagging issues medium
scope enum Areas to evaluate all

Standard Options

  • owasp-top10: Follow OWASP Top 10 guidelines to identify common web application security risks.
  • sans-top25: Use SANS Top 25 Most Dangerous Software Errors as a reference framework.
  • cwe: Reference the Common Weakness Enumeration (CWE) database for vulnerability identification.
  • nist: Apply NIST Cybersecurity Framework standards for the security assessment.
  • gdpr: Evaluate compliance with GDPR data protection and privacy requirements.
  • hipaa: Assess against HIPAA security and privacy standards for healthcare information.

Risk-Level Options

  • low: Flag only critical and high-severity security issues.
  • medium: Identify critical, high, and medium-severity security concerns.
  • high: Report all security issues including low-severity and potential future concerns.

Scope Options

  • input-validation: Focus on input validation vulnerabilities such as injection attacks, XSS, and input sanitization.
  • authentication: Concentrate on authentication mechanisms, credential management, and session handling.
  • authorization: Examine authorization controls, access rights, and privilege escalation risks.
  • data-protection: Analyze data encryption, storage practices, and sensitive information handling.
  • all: Conduct a comprehensive security review across all potential vulnerability categories.

Examples

Basic security audit of a web API endpoint

+++SecurityAudit(standard=owasp-top10, risk-level=medium, scope=input-validation)
Audit this express.js API endpoint for security vulnerabilities.

Performs a security audit focused on input validation vulnerabilities according to OWASP Top 10, with medium risk sensitivity.

Comprehensive HIPAA compliance check

+++SecurityAudit(standard=hipaa, risk-level=high, scope=all)
Review this patient data handling code for security issues.

Conducts a thorough security assessment against HIPAA standards across all security domains with high sensitivity to potential issues.

Model-Specific Implementations

gpt-4-turbo

Instruction: Analyze the following for security vulnerabilities according to industry standards. Identify risks and suggest fixes.

Notes: Simplified instruction for models with less security expertise.

Implementation Guidance

Code review for a web application

Original Prompt:

Review this login function for issues:

function login(username, password) {
  const user = db.findUser(username);
  if (user && user.password === password) {
    return generateToken(user);
  }
  return null;
}

Transformed Prompt:

Perform a security audit on the following content. Identify potential security vulnerabilities and provide recommendations for remediation. Follow OWASP Top 10 guidelines to identify common web application security risks. Identify critical, high, and medium-severity security concerns. Conduct a comprehensive security review across all potential vulnerability categories.

Review this login function for issues:

function login(username, password) {
  const user = db.findUser(username);
  if (user && user.password === password) {
    return generateToken(user);
  }
  return null;
}

Notes: The security audit decorator adds specific instructions to evaluate the code against security standards with appropriate risk sensitivity.

Transformation Details

Base Instruction: Perform a security audit on the following content. Identify potential security vulnerabilities and provide recommendations for remediation.

Placement: prepend

Composition Behavior: override

Parameter Effects:

  • standard:
  • When set to owasp-top10: Follow OWASP Top 10 guidelines to identify common web application security risks.
  • When set to sans-top25: Use SANS Top 25 Most Dangerous Software Errors as a reference framework.
  • When set to cwe: Reference the Common Weakness Enumeration (CWE) database for vulnerability identification.
  • When set to nist: Apply NIST Cybersecurity Framework standards for the security assessment.
  • When set to gdpr: Evaluate compliance with GDPR data protection and privacy requirements.
  • When set to hipaa: Assess against HIPAA security and privacy standards for healthcare information.

  • risk-level:

  • When set to low: Flag only critical and high-severity security issues.
  • When set to medium: Identify critical, high, and medium-severity security concerns.
  • When set to high: Report all security issues including low-severity and potential future concerns.

  • scope:

  • When set to input-validation: Focus on input validation vulnerabilities such as injection attacks, XSS, and input sanitization.
  • When set to authentication: Concentrate on authentication mechanisms, credential management, and session handling.
  • When set to authorization: Examine authorization controls, access rights, and privilege escalation risks.
  • When set to data-protection: Analyze data encryption, storage practices, and sensitive information handling.
  • When set to all: Conduct a comprehensive security review across all potential vulnerability categories.

Compatibility

  • Requires: None
  • Conflicts: Simplify, CreativeWriting
  • Compatible Models: gpt-4o, gpt-4-turbo, claude-3-7-sonnet-latest, llama-3.2
  • Standard Version: 1.0.0 - 2.0.0
  • CodeReview: Enhances SecurityAudit SecurityAudit adds security-specific analysis to general code reviews.
  • Simplify: Conflicts with SecurityAudit Security audits require detailed analysis which conflicts with simplification.