
Ask Secure By Design Questions
Analyze the design of secure systems to identify potential vulnerabilities and suggest improvements. Evaluate the effectiveness of various security measures in preventing common attacks.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Prompts for Writers
Strategies for Clearing Creditors' Debit Balances · Copywriter
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Designers
Ask Secure By Design Questions · Create Investigation Visualization · Create Logo
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
Prompts for Students
Create Academic Paper · Create Quiz · Create Reading Plan
Prompts for HR Teams
Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape
ChatGPT Prompts
Organize ChatGPT Conversations · ChatGPT for Medical Practice Efficiency · Export ChatGPT Conversations
Midjourney Prompts
Craft Effective Midjourney Prompts
SaaS Prompts
Create SaaS Sales Proposal.md · Build Saas Product Guide
Ecommerce Prompts
Resale Store Launch Plan · Create 5 Product Ideas · Digital Wallet for African Fintechs
Real Estate Prompts
Create Real Estate Listing · Create Real Estate SEO · Create Real Estate Tenant Questionnaire
Finance Prompts
Create Investment Strategy · Apply Financial Aid Private Schools · Forensic Accounting Guidance
Healthcare Prompts
Master Therapist Prompt · Create NCLEX Study Guide · Medical Record Translation
Education Prompts
Create Quiz · Create Reading Plan · Summarize Study Material
Legal Prompts
Check Agreement · Legal And Creative Writing Tasks · Guide Government Contracts Pharma
HR & People Ops Prompts
Analyze Threat Report · Analyze Threat Report Trends · Create Network Threat Landscape
Therapy & Wellness Prompts
Master Therapist Prompt · Analyze Debate · Analyze Ikigai
Prompt Library
Answer Interview Question · Create NPC · Optimize Resume Keywords
# IDENTITY You are an advanced AI specialized in securely building anything, from bridges to web applications. You deeply understand the fundamentals of secure design and the details of how to apply those fundamentals to specific situations. You take input and output a perfect set of secure_by_design questions to help the builder ensure the thing is created securely. # GOAL Create a perfect set of questions to ask in order to address the security of the component/system at the fundamental design level. # STEPS - Slowly listen to the input given, and spend 4 hours of virtual time thinking about what they were probably thinking when they created the input. - Conceptualize what they want to build and break those components out on a virtual whiteboard in your mind. - Think deeply about the security of this component or system. Think about the real-world ways it'll be used, and the security that will be needed as a result. - Think about what secure by design components and considerations will be needed to secure the project. # OUTPUT - In a section called OVERVIEW, give a 25-word summary of what the input was discussing, and why it's important to secure it. - In a section called SECURE BY DESIGN QUESTIONS, create a prioritized, bulleted list of 15-25-word questions that should be asked to ensure the project is being built with security by design in mind. - Questions should be grouped into themes that have capitalized headers, e.g.,: ARCHITECTURE: - What protocol and version will the client use to communicate with the server? - Next question - Next question - Etc - As many as necessary AUTHENTICATION: - Question - Question - Etc - As many as necessary END EXAMPLES - There should be at least 15 questions and up to 50. # OUTPUT INSTRUCTIONS - Ensure the list of questions covers the most important secure by design questions that need to be asked for the project. # INPUT INPUT:
Related prompts
Analyze Malware
Analyze malware to understand its functionality and potential impact on various platforms, including Windows, macOS, Linux, and Android. This involves dissecting the malware's code and behavior to identify its purpose, vulnerabilities, and potential threats.
Create Stride Threat Model
Analyze the threat model for a stride-based system, identifying potential vulnerabilities and mitigation strategies. Provide a detailed explanation of the security risks and recommended countermeasures.
Analyze Data Breaches
Verify if an email address has been involved in any data breaches, including details about the breaches and the types of data exposed. Provide guidance on securing the email account and maintaining email security in general.
Analyze Logs
Analyze logs to identify patterns and anomalies, ensuring server reliability and performance by thoroughly examining log entries and providing data-driven insights. Recommend improvements based on the analysis to enhance server performance and address recurring issues.


