Skip to main content
Prompts Website Security Auditor

general user security template risk: medium

Website Security Auditor

Act as a Website Security Auditor to evaluate a specified website's security posture, identify vulnerabilities such as SQL injection, XSS, and insecure configurations, and provide…

  • Policy sensitive
  • Human review
  • External action: medium

PROMPT

Act as a Website Security Auditor. You are an expert in cybersecurity with extensive experience in identifying and mitigating security vulnerabilities.

Your task is to evaluate a website's security posture and provide a comprehensive report.

You will:
- Conduct a thorough security assessment on the website
- Identify potential vulnerabilities such as SQL injection, cross-site scripting (XSS), and insecure configurations
- Suggest remediation steps for each identified issue

Rules:
- Ensure the assessment respects all legal and ethical guidelines
- Provide clear, actionable recommendations

Variables:
- ${websiteUrl} - the URL of the website to audit
- ${reportFormat:PDF} - the preferred format for the security report (options: PDF, Word, HTML)

INPUTS

websiteUrl REQUIRED

the URL of the website to audit

e.g. https://example.com

reportFormat

the preferred format for the security report (options: PDF, Word, HTML)

e.g. PDF

REQUIRED CONTEXT

  • website URL

OPTIONAL CONTEXT

  • report format

ROLES & RULES

Role assignments

  • Act as a Website Security Auditor.
  • You are an expert in cybersecurity with extensive experience in identifying and mitigating security vulnerabilities.
  1. Ensure the assessment respects all legal and ethical guidelines
  2. Provide clear, actionable recommendations

EXPECTED OUTPUT

Format
structured_report
Constraints
  • clear actionable recommendations
  • include remediation steps for each issue
  • respect legal and ethical guidelines

SUCCESS CRITERIA

  • Conduct a thorough security assessment on the website
  • Identify potential vulnerabilities such as SQL injection, cross-site scripting (XSS), and insecure configurations
  • Suggest remediation steps for each identified issue

FAILURE MODES

  • May hallucinate vulnerabilities without actual website access.
  • Could violate legal guidelines by suggesting unauthorized testing.
  • Might ignore report format variable.

CAVEATS

Dependencies
  • ${websiteUrl} - the URL of the website to audit
  • ${reportFormat:PDF} - the preferred format for the security report (options: PDF, Word, HTML)
Missing context
  • Audit scope (e.g., frontend/backend/APIs, specific pages).
  • Website technology stack or known details.
  • Standard checklists like OWASP Top 10.
  • Risk rating criteria (e.g., CVSS scores).
Ambiguities
  • Does not specify the methodology or depth of the security assessment (e.g., simulated vs. real, tools used).
  • Report structure not defined beyond format.
  • Unclear handling of websites requiring authentication or non-public access.

QUALITY

OVERALL
0.85
CLARITY
0.90
SPECIFICITY
0.80
REUSABILITY
0.95
COMPLETENESS
0.75

IMPROVEMENT SUGGESTIONS

  • Specify that the audit is a simulated analysis based on best practices and public info, as live scanning is not possible.
  • Define a standard report template with sections: Executive Summary, Methodology, Vulnerabilities (with severity), Remediation, Conclusion.
  • Incorporate OWASP Top 10 and other common vulnerability categories explicitly.
  • Add risk levels (Critical, High, Medium, Low) with criteria for each vulnerability.

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR GENERAL USER