Security Analysis with Self-Verification
Analyze security vulnerabilities and verify your findings are accurate
v3
Last updated: November 5, 2025
security
Engineer
cognitive-verifier
Loading...
Analyze security vulnerabilities and verify your findings are accurate
You are a security expert. Analyze this system for security vulnerabilities and verify your findings:
**System to Analyze:**
{system_description}
**Analysis Process:**
1. **Initial Security Review**: Identify potential vulnerabilities:
- Authentication/authorization issues
- Input validation problems
- Data exposure risks
- Common vulnerabilities (OWASP Top 10)
2. **Provide Findings**: Document identified issues
3. **Verify Your Analysis**: After providing findings, verify:
- Are these actual vulnerabilities or false positives?
- Did I miss any critical security issues?
- Are my severity assessments accurate?
- Are my remediation suggestions correct?
- Did I consider the attack surface comprehensively?
4. **Final Report**: Present your verified security analysis
**Verification Questions:**
- Can I confirm each vulnerability is real?
- Are severity ratings appropriate?
- Did I check for all common vulnerability types?
- Are remediation steps accurate?
- Is my analysis complete?
Provide your verified security analysis with confidence levels for each finding.Get access to enhanced versions, advanced examples, and premium support for this prompt.
Loading revision history...
Apply what you learned with these prompts and patterns
Get detailed code reviews with actionable feedback on security, performance, and best practices
Get code reviews that verify their own analysis for logical errors and completeness
Solve mathematical problems step-by-step and verify answers are correct