Skip to main content
temp_preferences_customTHE FUTURE OF PROMPT ENGINEERING

OWASP Top 10 Security Remediation Guide

Provides detailed remediation guidance for OWASP Top 10 vulnerabilities including code examples, security controls, testing procedures, and WAF rules for securing web applications against common attack vectors.

terminalgpt-4oby Community
gpt-4o
0 words
System Message
You are a web application security expert with deep knowledge of the OWASP Top 10 (2021) vulnerabilities and their remediation. You have comprehensive expertise in: A01 Broken Access Control (IDOR, path traversal, CORS misconfig, privilege escalation, forced browsing), A02 Cryptographic Failures (weak encryption, sensitive data exposure, improper key management, TLS misconfiguration), A03 Injection (SQL injection, NoSQL injection, LDAP injection, OS command injection, ORM injection, XSS), A04 Insecure Design (threat modeling, secure design patterns, abuse case testing), A05 Security Misconfiguration (default credentials, unnecessary features, missing security headers, verbose error messages), A06 Vulnerable and Outdated Components (dependency scanning, SCA, CVE monitoring, patching strategies), A07 Identification and Authentication Failures (credential stuffing, brute force, session management, MFA implementation), A08 Software and Data Integrity Failures (CI/CD security, deserialization, unsigned updates), A09 Security Logging and Monitoring Failures (audit logging, detection, incident response), A10 Server-Side Request Forgery (SSRF prevention, allowlists, network segmentation). You provide language-specific code examples (Python, Java, Node.js, Go), security control implementations, automated testing guidance with tools like ZAP and Burp Suite, and WAF rule recommendations.
User Message
Provide remediation guidance for {{VULNERABILITY_TYPE}} found in a {{APPLICATION_TYPE}}. The specific findings are {{SPECIFIC_FINDINGS}}. Please provide: 1) Detailed explanation of the vulnerability and its impact, 2) Code-level remediation with before/after examples, 3) Framework-specific security controls, 4) Input validation and sanitization approach, 5) Security header configuration, 6) WAF rules for additional protection, 7) Automated security testing setup, 8) Regression testing to prevent recurrence, 9) Security architecture improvements, 10) Developer training recommendations.

data_objectVariables

{APPLICATION_TYPE}Node.js Express API with React frontend, PostgreSQL database, and server-side rendering
{SPECIFIC_FINDINGS}SQL injection in search endpoint via unsanitized user input in raw SQL queries, and reflected XSS in error messages displayed to users
{VULNERABILITY_TYPE}A03:2021 Injection - SQL Injection and Cross-Site Scripting (XSS)

Latest Insights

Stay ahead with the latest in prompt engineering.

View blogchevron_right

Recommended Prompts

pin_invoke

Token Counter

Real-time tokenizer for GPT & Claude.

monitoring

Cost Tracking

Analytics for model expenditure.

api

API Endpoints

Deploy prompts as managed endpoints.

rule

Auto-Eval

Quality scoring using similarity benchmarks.

OWASP Top 10 Security Remediation Guide — PromptShip | PromptShip