Sec Section AI Prompts

A collection of AI prompts for all Sec Section teams to improve security workflows and processes

Overview

This document outlines AI prompts that all Sec Section teams can use with Duo Agent to improve security workflows, enhance code review processes, and streamline security analysis tasks. These prompts are designed to meet the criteria outlined in the AI Transformation Initiative and are applicable to Software Supply Chain Security, Application Security Testing, and Security Risk Management teams.

Table of Contents

Security-Focused Prompts

Prompt Use Case Expected Impact Frequency
Security Code Review Security-focused code reviews for all security domains Reduces security vulnerabilities by 30%, improves code review efficiency by 40% Every MR
Vulnerability Analysis Security vulnerability assessment and remediation guidance Reduces vulnerability analysis time by 50%, improves remediation quality by 35% As needed
Compliance Audit Regulatory and standards compliance verification (SOC2, FedRAMP, GDPR, etc.) Reduces audit preparation time by 55%, improves compliance coverage by 40% Quarterly
Security Testing Security test planning and execution for comprehensive testing Improves security test coverage by 35%, reduces security testing time by 30% Per sprint

Team Management & Process Prompts

Prompt Use Case Expected Impact Frequency
Weekly Team Status Summary Team progress tracking and status reporting Saves 2-3 hours weekly on status report preparation Weekly
Code Review Quality Assessment Comprehensive code review quality analysis Reduces defects in production by 40%, improves code review consistency by 50% Every MR
Incident Post-Mortem Analysis Incident root cause analysis and prevention Reduces incident analysis time by 60%, improves prevention strategies by 45% Per incident
Technical Debt Prioritization Technical debt management and prioritization Improves resource allocation by 35%, reduces maintenance overhead by 40% Monthly
Sprint Planning Optimization Sprint estimation and capacity planning optimization Improves sprint completion rates by 30%, reduces estimation errors by 40% Per sprint
Onboarding Documentation Generator New engineer onboarding and documentation generation Reduces time to first commit for new hires by 50%, improves onboarding consistency by 60% Per new hire
Authentication RFH Early Investigation Review and validate incoming RFH for first triage Reduces the need for manual RFH triage and support response by 25% by validating provided info or knowledge base Multiple times a week

Security Experiments & Advanced Prompts

Prompt Use Case Expected Impact Frequency
Vulnerability Management Analysis Vulnerability reports analysis and remediation prioritization Reduces vulnerability analysis time by 45%, improves remediation prioritization by 50% Weekly
Compliance Management Assessment Compliance assessments and audit preparation Reduces compliance assessment time by 40%, improves audit readiness by 55% Monthly
Security Policy Management Security policy creation, management, and enforcement Improves policy creation efficiency by 50%, enhances policy enforcement consistency by 45% As needed
Security Experiment Analysis Security experiment evaluation and scaling decisions Improves experiment analysis efficiency by 40%, enhances decision-making by 50% Per experiment

SAST & Security Tooling Prompts

Prompt Use Case Expected Impact Frequency
SAST False Positive Detection SAST false positive identification and noise reduction Reduces false positive noise by 60%, improves SAST adoption by 40% Every SAST scan
SAST Vulnerability Triage SAST vulnerability prioritization and remediation guidance Improves triage efficiency by 45%, reduces false positive noise by 50% Every SAST scan
Security Tooling Optimization Security tool configuration and performance optimization Improves tool effectiveness by 35%, reduces false positive rates by 40% Monthly

Security Code Review Prompt

Use Case / Impact

When conducting security-focused code reviews, this prompt helps identify potential security vulnerabilities, compliance issues, and best practices violations in merge requests. This is valuable for all Sec Section teams working on security features, vulnerability management, compliance, and security tooling.

Expected Impact: Reduces security vulnerabilities by 30%, improves code review efficiency by 40%, and ensures consistent security standards across all changes.

Prompt

You are a security expert conducting a security-focused code review for GitLab features. Analyze this merge request with focus on:

**Security Analysis:**
1. **Authentication & Authorization**: Review authentication flows, token handling, permission checks, and access controls
2. **Input Validation**: Check for injection vulnerabilities, XSS, CSRF, and input sanitization
3. **Secrets Management**: Verify proper handling of secrets, API keys, and sensitive data
4. **Compliance**: Ensure adherence to security standards (OWASP, NIST, SLSA, etc.)
5. **Security Tooling**: Review security scanner configuration, vulnerability management, and security testing

**Specific Areas to Examine:**
- SQL injection vulnerabilities in database queries
- Cross-site scripting (XSS) in user-facing code
- Cross-site request forgery (CSRF) protection
- Secure token storage and transmission
- Proper error handling without information disclosure
- Input validation and sanitization
- Authentication bypass possibilities
- Authorization logic flaws
- Cryptographic implementation issues
- Logging of sensitive information
- Security scanner configuration issues
- Vulnerability management implementation

**Output Format:**
- **Critical Issues**: High-severity security vulnerabilities that must be fixed
- **Medium Issues**: Security concerns that should be addressed
- **Low Issues**: Security improvements and best practices
- **Compliance Notes**: Any compliance-related observations
- **Recommendations**: Specific code changes or security enhancements

**Context**: This is for Sec Section features including security tooling, vulnerability management, compliance, and security testing. Focus on GitLab's security model and our specific threat landscape.

Vulnerability Analysis Prompt

Use Case / Impact

When analyzing security vulnerabilities reported through GitLab’s security features or external reports, this prompt helps provide comprehensive analysis and remediation guidance.

Expected Impact: Reduces vulnerability analysis time by 50%, improves remediation quality by 35%, and ensures consistent security response processes.

Prompt

You are a security analyst investigating a reported vulnerability in GitLab's Sec Section features. Analyze this security issue with focus on:

**Vulnerability Assessment:**
1. **Severity Classification**: Determine CVSS score and impact level
2. **Attack Vector**: Identify how the vulnerability can be exploited
3. **Affected Components**: Map which security features, vulnerability management, compliance, or security tooling are impacted
4. **Root Cause Analysis**: Identify the underlying security flaw
5. **Exploitability**: Assess how easily the vulnerability can be exploited

**Impact Analysis:**
- **Confidentiality**: Risk of unauthorized data access
- **Integrity**: Risk of unauthorized data modification
- **Availability**: Risk of service disruption
- **Compliance Impact**: Effect on security standards and regulations
- **User Impact**: How this affects GitLab users and customers

**Remediation Strategy:**
- **Immediate Mitigations**: Quick fixes to reduce risk
- **Long-term Solutions**: Comprehensive fixes addressing root cause
- **Testing Requirements**: Security tests needed to verify fixes
- **Monitoring**: Detection methods for similar issues
- **Documentation**: Updates needed for security documentation

**Output Format:**
- **Executive Summary**: High-level impact and recommended actions
- **Technical Details**: Specific vulnerability information
- **Remediation Plan**: Step-by-step fix implementation
- **Testing Strategy**: How to verify the fix works
- **Prevention Measures**: How to prevent similar issues

**Context**: This vulnerability affects GitLab's Sec Section teams working on security features, vulnerability management, compliance, and security tooling.

Compliance Audit Prompt

Use Case / Impact

When conducting compliance audits or preparing for security assessments, this prompt helps ensure all compliance requirements are met and documented properly.

Expected Impact: Reduces audit preparation time by 55%, improves compliance coverage by 40%, and ensures consistent compliance reporting across all security features.

Prompt

You are a compliance auditor conducting a compliance audit for GitLab projects using GitLab's native compliance and security features. Focus on project level implementation of security controls within the GitLab ecosystem. Analyze this implementation with focus on:

**Compliance Frameworks:**
1. **SOC 2 Type II**: Security, availability, and confidentiality controls
2. **FedRAMP**: Federal Risk and Authorization Management Program
3. **GDPR**: General Data Protection Regulation compliance
4. **ISO 27001**: Information security management systems
5. **NIST Cybersecurity Framework**: Core security functions
6. **SLSA**: Supply-chain Levels for Software Artifacts

**Security Control Areas:**
- **Access Controls**: User authentication and authorization
- **Data Protection**: Encryption, data handling, and privacy
- **Audit Logging**: Security event logging and monitoring
- **Incident Response**: Security incident handling procedures
- **Risk Management**: Security risk assessment and mitigation
- **Vulnerability Management**: Security vulnerability handling
- **Change Management**: Security change control processes
- **Business Continuity**: Security continuity planning

**Compliance Requirements:**
- **Technical Controls**: Implementation of security technologies
- **Administrative Controls**: Security policies and procedures
- **Physical Controls**: Physical security measures
- **Monitoring Controls**: Security monitoring and alerting
- **Documentation Controls**: Security documentation requirements

**Audit log:**
- **Authentication & Access Events**: Monitor login patterns and access control violations
- **Administrative Actions**: Track high-privilege operations and system modifications
- **Code & Infrastructure Changes**: Identify unauthorized modifications to critical systems
- **Suspicious Access Patterns**: Identify unusual user behavior and potential threats
- **Administrative Behavior Red Flags**: Detect abuse of privileged access and system manipulation
- **Development Workflow Anomalies**: Monitor for malicious code changes and policy violations

**Output Format:**
- **Compliance Status**: Current compliance level for each framework
- **Gap Analysis**: Missing controls or requirements
- **Risk Assessment**: Compliance risks and their impact
- **Remediation Plan**: Steps to achieve full compliance
- **Evidence Collection**: Required documentation and artifacts

**Context**: This audit is for GitLab's Sec Section teams projects that must meet enterprise security requirements.

Security Testing Prompt

Use Case / Impact

When planning or reviewing security tests, this prompt helps ensure comprehensive security testing coverage and identifies potential security test gaps.

Expected Impact: Improves security test coverage by 35%, reduces security testing time by 30%, and ensures consistent security testing standards across all features.

Prompt

You are a security testing expert reviewing security test plans for Sec Section features. Analyze this testing approach with focus on:

**Security Testing Areas:**
1. **Authentication Testing**: Login mechanisms, session management, and identity verification
2. **Authorization Testing**: Access controls, permission checks, and privilege escalation
3. **Input Validation Testing**: Injection attacks, XSS, CSRF, and input sanitization
4. **Compliance Testing**: Regulatory and standards compliance verification
5. **Pipeline Security Testing**: CI/CD security and artifact integrity testing

**Test Categories:**
- **Static Application Security Testing (SAST)**: Code analysis for security vulnerabilities
- **Dynamic Application Security Testing (DAST)**: Runtime security testing
- **Interactive Application Security Testing (IAST)**: Real-time security testing
- **Penetration Testing**: Manual security testing and exploitation
- **Compliance Testing**: Regulatory and standards compliance verification

**Security Test Scenarios:**
- **Authentication Bypass**: Attempts to bypass authentication mechanisms
- **Authorization Flaws**: Testing for privilege escalation and access control issues
- **Injection Attacks**: SQL injection, command injection, and other injection vulnerabilities
- **Cross-Site Scripting (XSS)**: Reflected, stored, and DOM-based XSS testing
- **Cross-Site Request Forgery (CSRF)**: CSRF token validation and protection testing
- **Session Management**: Session fixation, hijacking, and timeout testing
- **Cryptographic Testing**: Encryption, hashing, and key management testing

**Test Data Requirements:**
- **Test Accounts**: Various user roles and permission levels
- **Test Data**: Sensitive and non-sensitive test data
- **Attack Payloads**: Malicious inputs for security testing
- **Compliance Data**: Data required for compliance testing
- **Performance Data**: Data for security performance testing

**Output Format:**
- **Test Coverage Analysis**: Current security test coverage
- **Missing Tests**: Security tests that should be added
- **Test Data Requirements**: Data needed for comprehensive testing
- **Test Environment Setup**: Security testing environment requirements
- **Test Execution Plan**: Step-by-step test execution strategy

**Context**: This security testing is for GitLab's Sec Section teams working on security features, vulnerability management, compliance, and security tooling that require comprehensive security testing.

Weekly Team Status Summary Prompt

Use Case / Impact

When preparing weekly status updates for Sec Section teams, this prompt helps aggregate team progress across multiple security issues, merge requests, and deliverables.

Expected Impact: Saves 2-3 hours weekly on status report preparation, improves visibility into team progress, and ensures consistent reporting across all SSCS teams.

Prompt

You are analyzing the weekly progress for Sec Section teams. Review all issues and merge requests assigned to team members updated in the last week and provide a comprehensive status summary.

**Analysis Scope:**
1. **Team Members**: [List of team members or @mention the team]
2. **Time Period**: Last 7 days
3. **Focus Areas**: Authentication, Authorization, Compliance, Pipeline Security
4. **Work Types**: Issues, merge requests, security reviews, compliance work

**Summary Requirements:**
- **Completed Work**: Security features delivered, vulnerabilities fixed, compliance items completed
- **In Progress**: Current security work, ongoing security reviews, active compliance tasks
- **Blockers**: Security-related blockers, compliance dependencies, external security reviews
- **Upcoming Deliverables**: Planned security features, compliance deadlines, security audits
- **Team Velocity**: Story points completed, security issues resolved, merge requests merged
- **Security Metrics**: Vulnerabilities addressed, compliance items completed, security tests passed

**Security-Specific Focus:**
- **Vulnerability Management**: Security issues resolved and new vulnerabilities identified
- **Compliance Progress**: Regulatory compliance items and audit preparation
- **Security Reviews**: Code reviews completed and security assessments
- **Pipeline Security**: CI/CD security improvements and artifact integrity work
- **Authentication/Authorization**: Identity and access management enhancements

**Output Format:**
- **Executive Summary**: High-level security team progress and key achievements
- **Completed Work**: Detailed list of security deliverables and fixes
- **Current Work**: Active security projects and their status
- **Blockers & Risks**: Security-related blockers and compliance risks
- **Next Week Priorities**: Planned security work and compliance tasks
- **Metrics & KPIs**: Security team performance indicators

**Context**: This is for Sec Section teams working on security features, vulnerability management, compliance, and security tooling features critical to GitLab's security posture.

Code Review Quality Assessment Prompt

Use Case / Impact

When conducting code reviews for security features, this prompt ensures comprehensive security analysis and consistent review quality across all security-related changes.

Expected Impact: Reduces security defects in production by 40%, improves code review consistency by 50%, and ensures all security changes meet high standards.

Prompt

You are conducting a comprehensive code review for Sec Section features. Analyze this merge request with focus on security, performance, maintainability, and compliance.

**Security Analysis:**
1. **Authentication Security**: Login mechanisms, session management, token handling
2. **Authorization Security**: Access controls, permission checks, privilege escalation prevention
3. **Input Validation**: Injection prevention, XSS protection, CSRF mitigation
4. **Secrets Management**: Secure storage and transmission of sensitive data
5. **Compliance**: Adherence to security standards and regulatory requirements

**Code Quality Areas:**
- **Security Vulnerabilities**: OWASP Top 10, common security flaws, attack vectors
- **Performance Issues**: Database queries, API response times, resource usage
- **Code Maintainability**: Code organization, documentation, complexity
- **Test Coverage**: Security tests, unit tests, integration tests
- **Coding Standards**: GitLab coding conventions, security best practices

**Security-Specific Checks:**
- **SQL Injection**: Database query security and parameterization
- **Cross-Site Scripting (XSS)**: Output encoding and input sanitization
- **Cross-Site Request Forgery (CSRF)**: Token validation and protection
- **Authentication Bypass**: Login mechanism security and session handling
- **Authorization Flaws**: Access control logic and permission validation
- **Cryptographic Issues**: Encryption, hashing, and key management
- **Information Disclosure**: Error handling and logging security

**Output Format:**
- **Critical Issues**: High-severity security vulnerabilities that must be fixed
- **Security Concerns**: Medium-severity security issues that should be addressed
- **Code Quality Issues**: Maintainability, performance, and standards violations
- **Test Coverage Gaps**: Missing security tests and test improvements
- **Compliance Notes**: Regulatory and standards compliance observations
- **Specific Recommendations**: Line-by-line suggestions with code examples

**Context**: This review is for Sec Section features including security features, vulnerability management, compliance, and security tooling that require the highest security standards.

Incident Post-Mortem Analysis Prompt

Use Case / Impact

When analyzing security incidents, this prompt provides structured root cause analysis and generates actionable prevention strategies for future security improvements.

Expected Impact: Reduces incident analysis time by 60%, improves prevention strategies by 45%, and ensures consistent incident response processes across security teams.

Prompt

You are conducting a post-mortem analysis for a security incident in Sec Section features. Analyze the incident timeline, related issues, and logs to provide comprehensive insights.

**Incident Analysis:**
1. **Timeline Reconstruction**: Sequence of events leading to the security incident
2. **Root Cause Analysis**: Underlying technical and process failures
3. **Contributing Factors**: Secondary causes and environmental factors
4. **Impact Assessment**: Scope of security impact and affected systems
5. **Detection Analysis**: How the incident was discovered and response time

**Security-Specific Focus:**
- **Attack Vector**: How the security incident was exploited
- **Vulnerability Analysis**: Underlying security flaws that enabled the incident
- **Compliance Impact**: Effect on security certifications and regulatory compliance
- **Data Breach Assessment**: Whether sensitive data was compromised
- **User Impact**: Effect on GitLab users and customer security
- **System Impact**: Effect on security features, vulnerability management, compliance, or security tooling

**Historical Analysis:**
- **Similar Incidents**: Past security incidents with similar characteristics
- **Pattern Recognition**: Recurring security issues and trends
- **Prevention History**: Previous attempts to prevent similar incidents
- **Lessons Learned**: Insights from past security incident responses

**Action Items Generation:**
- **Immediate Fixes**: Quick security patches and mitigations
- **Process Improvements**: Security process and workflow enhancements
- **Technical Debt**: Security technical debt that should be addressed
- **Training Needs**: Security training and awareness improvements
- **Monitoring Enhancements**: Security monitoring and alerting improvements
- **Documentation Updates**: Security documentation and runbook updates

**Output Format:**
- **Incident Summary**: High-level incident overview and impact
- **Root Cause Analysis**: Detailed technical and process analysis
- **Contributing Factors**: Secondary causes and environmental issues
- **Similar Incidents**: Historical context and pattern analysis
- **Action Items**: 3-5 concrete, measurable action items with owners and timelines
- **Prevention Strategy**: Long-term security improvements and process changes

**Context**: This security incident affects GitLab's Sec Section teams working on security features, vulnerability management, compliance, and security tooling critical to GitLab's security posture.

Technical Debt Prioritization Prompt

Use Case / Impact

When prioritizing technical debt in security features, this prompt helps balance security improvements against new feature development while considering security risks and compliance requirements.

Expected Impact: Improves resource allocation by 35%, reduces security maintenance overhead by 40%, and ensures critical security debt is addressed promptly.

Prompt

You are prioritizing technical debt for Sec Section features. Analyze the backlog of security-related technical debt issues and provide a prioritized roadmap.

**Technical Debt Analysis:**
1. **Security Impact**: Risk level and potential security vulnerabilities
2. **Compliance Impact**: Effect on regulatory compliance and security certifications
3. **Development Velocity**: Impact on team productivity and feature delivery
4. **Maintenance Burden**: Ongoing maintenance costs and complexity
5. **Implementation Effort**: Time and resources required to address the debt

**Security-Specific Considerations:**
- **Vulnerability Risk**: Potential security vulnerabilities from technical debt
- **Compliance Requirements**: Regulatory and standards compliance implications
- **Security Architecture**: Impact on overall security architecture and design
- **Performance Security**: Effect on security performance and monitoring
- **Code Security**: Impact on code security and maintainability
- **Testing Security**: Effect on security testing and validation

**Prioritization Criteria:**
- **Critical Security Issues**: High-risk security vulnerabilities that must be addressed
- **Compliance Deadlines**: Regulatory requirements with specific deadlines
- **Development Blockers**: Technical debt that blocks new security features
- **Maintenance Efficiency**: Debt that significantly impacts maintenance
- **Team Productivity**: Issues that affect team velocity and morale
- **Customer Impact**: Technical debt that affects customer security experience

**Resource Allocation:**
- **Immediate (Next Sprint)**: Critical security issues and compliance requirements
- **Short-term (Next Quarter)**: High-impact security improvements and blockers
- **Medium-term (Next 6 Months)**: Important security enhancements and efficiency gains
- **Long-term (Next Year)**: Strategic security improvements and architecture updates

**Output Format:**
- **Priority Matrix**: Technical debt items ranked by security impact and effort
- **Resource Allocation**: Recommended time allocation for different priority levels
- **Timeline Roadmap**: Phased approach to addressing technical debt
- **Risk Assessment**: Security risks of not addressing specific debt items
- **Success Metrics**: Measurable outcomes for technical debt reduction
- **Dependencies**: Technical debt items that depend on others

**Context**: This prioritization is for Sec Section technical debt including security features, vulnerability management, compliance, and security tooling improvements.

Sprint Planning Optimization Prompt

Use Case / Impact

When planning sprints for Sec Section teams, this prompt helps improve estimation accuracy, identify scope creep patterns, and optimize team capacity utilization for security work.

Expected Impact: Improves sprint completion rates by 30%, reduces estimation errors by 40%, and increases team satisfaction with planning accuracy.

Prompt

You are analyzing sprint planning for Sec Section teams. Review the last 3 sprints and provide optimization recommendations for upcoming sprint planning.

**Sprint Analysis:**
1. **Story Point Accuracy**: Compare estimated vs actual story points completed
2. **Scope Changes**: Issues added/removed during sprint execution
3. **Blocked Items**: Security-related blockers and their resolution time
4. **Team Capacity**: Actual vs planned capacity utilization
5. **Security Work Distribution**: Balance between features, bugs, and technical debt

**Security-Specific Metrics:**
- **Vulnerability Resolution**: Time to fix security issues vs estimates
- **Compliance Work**: Regulatory compliance items and their complexity
- **Security Reviews**: Code review time and security assessment duration
- **Pipeline Security**: CI/CD security work and artifact integrity tasks
- **Authentication/Authorization**: Identity management work complexity

**Pattern Analysis:**
- **Estimation Errors**: Common patterns in over/under-estimation
- **Scope Creep**: Security requirements that expand during development
- **Blocking Patterns**: Recurring security-related blockers
- **Capacity Issues**: Team availability and skill distribution
- **Security Dependencies**: External security reviews and compliance dependencies

**Sprint Planning Improvements:**
- **Estimation Techniques**: Better methods for security work estimation
- **Buffer Recommendations**: Appropriate buffers for security work
- **Dependency Management**: How to handle security dependencies
- **Capacity Planning**: Optimal team capacity for security work
- **Risk Mitigation**: Strategies to reduce sprint risks

**Output Format:**
- **Sprint Performance Summary**: Key metrics from last 3 sprints
- **Estimation Accuracy Analysis**: Patterns in estimation errors
- **Scope Management**: Recommendations for scope control
- **Capacity Optimization**: Team capacity and skill recommendations
- **Planning Improvements**: Specific changes for upcoming sprints
- **Risk Mitigation**: Strategies to reduce sprint risks

**Context**: This analysis is for Sec Section teams working on security features, vulnerability management, compliance, and security tooling features that require careful planning and estimation.

Onboarding Documentation Generator Prompt

Use Case / Impact

When onboarding new engineers to Sec Section teams, this prompt helps generate up-to-date onboarding materials based on current codebase, architecture, and team processes.

Expected Impact: Reduces time to first commit for new hires by 50%, improves onboarding consistency by 60%, and increases new hire productivity in their first month.

Prompt

You are creating onboarding documentation for new Sec Section engineers. Generate a comprehensive onboarding checklist based on current codebase, architecture, and team processes.

**Onboarding Scope:**
1. **Security Architecture**: Security features, vulnerability management, compliance, and security tooling systems
2. **Codebase Structure**: Key repositories, modules, and security components
3. **Development Setup**: Local development environment and security tools
4. **Team Processes**: Security workflows, review processes, and compliance procedures
5. **First Week Tasks**: Specific assignments to get new engineers productive quickly

**Security-Specific Onboarding:**
- **Security Tools**: Security scanning tools, vulnerability assessment tools, compliance tools
- **Authentication Systems**: Login mechanisms, session management, token handling
- **Authorization Models**: Access controls, permissions, and privilege management
- **Compliance Requirements**: Regulatory standards, audit procedures, documentation
- **Pipeline Security**: CI/CD security, artifact integrity, supply chain security
- **Security Testing**: Security test frameworks, vulnerability testing, compliance testing

**Development Environment:**
- **Key Repositories**: Main GitLab repository, security-specific repositories
- **Local Setup**: Development environment, database setup, security configurations
- **Testing Environment**: Security testing setup, compliance testing environment
- **Monitoring Tools**: Security monitoring, compliance dashboards, alerting systems
- **Documentation**: Security documentation, compliance guides, team processes

**First Week Tasks:**
- **Day 1**: Environment setup, access provisioning, team introductions
- **Day 2-3**: Codebase exploration, security architecture overview
- **Day 4-5**: First security task, code review participation
- **Week 2**: Independent security work, compliance training
- **Week 3-4**: Full integration into security workflows

**Security Training:**
- **Security Fundamentals**: OWASP, NIST, SLSA standards and practices
- **GitLab Security**: Internal security policies and procedures
- **Compliance Training**: Regulatory requirements and audit procedures
- **Tool Training**: Security tools and vulnerability assessment
- **Process Training**: Security workflows and incident response

**Output Format:**
- **Onboarding Checklist**: Step-by-step onboarding tasks
- **Environment Setup**: Detailed setup instructions
- **Key Resources**: Important documentation and tools
- **First Week Plan**: Specific tasks and milestones
- **Security Training**: Required security education
- **Team Contacts**: Key people and escalation paths

**Context**: This onboarding is for new Sec Section engineers joining teams working on security features, vulnerability management, compliance, and security tooling features.

Authentication RFH Early Investigation Prompt

Use Case / Impact

When dev-help issues are raised for GitLab’s Authentication features, this prompt helps support teams perform initial triage, validate reproduction steps, and identify common authentication issues before escalating to the Authentication engineering team.

Expected Impact: Reduces the need for manual RFH triage and support response by 25% by validating provided info or knowledge base.

Prompt

You are performing initial triage on an authentication-related dev-help issue for GitLab. Analyze the issue to validate completeness, identify common authentication problems, and determine if engineering investigation is needed.

**Authentication Issue Validation:**
1. **Error Details**: Are specific authentication error messages provided?
2. **Provider Type**: Is the authentication method clearly identified (LDAP/SAML/OAuth/internal)?
3. **Configuration**: Are authentication provider settings included?
4. **User Impact**: How many users affected and what's the business impact?
5. **Logs**: Are relevant authentication logs with timestamps included?
6. **Version**: Is GitLab version specified and is it current?

**Common LDAP Authentication Issues:**
- **Connection Failures**: LDAP server unreachable or timeout
- **Bind DN Issues**: Incorrect bind DN or password
- **User Filter Problems**: LDAP filter not matching users
- **Attribute Mapping**: Missing or incorrect attribute mappings
- **SSL/TLS Errors**: Certificate validation failures
- **Group Sync Issues**: Group memberships not syncing correctly

**Common SAML Authentication Issues:**
- **Assertion Errors**: Invalid SAML assertions or signatures
- **Certificate Problems**: Expired or mismatched certificates
- **Attribute Missing**: Required attributes not in SAML response
- **ACS URL Mismatch**: Assertion Consumer Service URL incorrect
- **IdP Configuration**: Identity provider settings misconfigured
- **NameID Format**: Incorrect NameID format specified

**Common OAuth/OIDC Issues:**
- **Redirect URI Mismatch**: Callback URL not matching configuration
- **Scope Problems**: Required scopes not granted
- **Token Expiration**: Access/refresh token lifecycle issues
- **Client Credentials**: Invalid client ID or secret
- **Authorization Flow**: Incorrect OAuth flow implementation
- **CORS Issues**: Cross-origin resource sharing blocks

**Internal Authentication Issues:**
- **Password Reset**: Email delivery or token problems
- **2FA Problems**: TOTP time sync or recovery code issues
- **Account Lockout**: Brute force protection triggering incorrectly
- **Session Management**: Session timeout or persistence issues
- **Email Confirmation**: Confirmation emails not arriving
- **Username/Email**: Login identifier configuration problems

**Configuration Validation Checks:**
- **Provider Connectivity**: Can GitLab reach the authentication provider?
- **Certificate Validation**: Are SSL certificates valid and trusted?
- **Time Synchronization**: Is server time synchronized (critical for SAML/2FA)?
- **Network Path**: Are firewalls/proxies blocking authentication?
- **DNS Resolution**: Can GitLab resolve provider hostnames?
- **Feature Flags**: Are relevant authentication features enabled?

**Log Analysis Requirements:**
- **Production.log**: Authentication attempt entries
- **Auth.log**: Detailed authentication provider communication
- **Application.log**: User session and authentication errors
- **Sidekiq.log**: Background job processing for auth tasks
- **LDAP/SAML Trace**: Provider-specific debug logging

**Known Authentication Patterns:**
**Triage Decision Matrix:**
| Symptom | Check | If True → Action | If False → Next Step |
|---------|-------|------------------|---------------------|
| Login fails for all users | Provider connectivity | Network/firewall issue | Check provider config |
| Login fails for specific users | User exists in GitLab | Check identity linking | Verify user attributes |
| Intermittent failures | Time sync issues | Fix NTP configuration | Check load/timeouts |
| Works in UI but not API | Token vs session auth | Check API authentication | Verify headers/tokens |

**Pre-Engineering Checklist:**
- [ ] Error messages are specific and complete
- [ ] Authentication provider type is identified
- [ ] Configuration has been validated against docs
- [ ] Logs show the authentication flow
- [ ] Network connectivity has been verified
- [ ] Known issues database has been checked
- [ ] Basic troubleshooting has been attempted

**Output Format:**
- **Issue Classification**: LDAP/SAML/OAuth/Internal/Multi-provider
- **Validation Status**: Missing information listed
- **Initial Diagnosis**: Most likely root cause
- **Known Issue Match**: Links to matching known issues
- **Troubleshooting Steps**: Specific actions to try
- **Engineering Escalation**: If needed, what investigation is required

**Immediate Actions for Support:**
1. **Validate Information**: Ensure all required details are present
2. **Check Known Issues**: Search for exact error in knowledge base
3. **Test Connectivity**: Verify basic network connectivity
4. **Review Configuration**: Compare against working examples
5. **Collect Debug Logs**: Enable verbose logging if needed
6. **Apply Workarounds**: Try known workarounds before escalation

**When to Escalate to Engineering:**
- New error pattern not in knowledge base
- Code-level bug suspected after validation
- Security vulnerability implications
- Multiple customers affected by same issue
- All troubleshooting steps exhausted

**Context**: This triage is specifically for authentication-related dev-help issues affecting GitLab's authentication features including LDAP, SAML, OAuth, and internal authentication mechanisms.

Vulnerability Management Analysis Prompt

Use Case / Impact

When analyzing vulnerability reports and findings, this prompt helps security teams understand vulnerability patterns, prioritize remediation efforts, and track security posture improvements.

Expected Impact: Reduces vulnerability analysis time by 45%, improves remediation prioritization by 50%, and enhances security posture visibility.

Prompt

You are analyzing vulnerability management data for Sec Section teams. Review vulnerability reports, findings, and security scan results to provide comprehensive security insights.

**Vulnerability Analysis:**
1. **Vulnerability Trends**: Patterns in vulnerability types, severity, and frequency
2. **Risk Assessment**: High-risk vulnerabilities requiring immediate attention
3. **Remediation Status**: Progress on vulnerability fixes and outstanding issues
4. **Security Posture**: Overall security health and improvement trends
5. **Compliance Impact**: Vulnerabilities affecting regulatory compliance

**Security-Specific Focus:**
- **Critical Vulnerabilities**: CVSS 9.0+ vulnerabilities requiring immediate action
- **Authentication Vulnerabilities**: Login, session, and token-related security issues
- **Authorization Flaws**: Access control and permission-related vulnerabilities
- **Compliance Violations**: Vulnerabilities affecting SOC2, FedRAMP, GDPR compliance
- **Pipeline Security**: CI/CD and artifact integrity vulnerabilities
- **Dependency Vulnerabilities**: Third-party library and package security issues

**Analysis Requirements:**
- **Vulnerability Classification**: Categorize by type, severity, and impact
- **Remediation Priority**: Rank vulnerabilities by business impact and exploitability
- **Trend Analysis**: Identify patterns and recurring vulnerability types
- **Compliance Mapping**: Map vulnerabilities to regulatory requirements
- **Team Performance**: Track vulnerability resolution metrics and SLAs

**Output Format:**
- **Executive Summary**: High-level security posture and key findings
- **Critical Issues**: Immediate action items for high-severity vulnerabilities
- **Trend Analysis**: Vulnerability patterns and security improvement trends
- **Remediation Roadmap**: Prioritized list of vulnerabilities to address
- **Compliance Status**: Regulatory compliance impact and requirements
- **Team Metrics**: Vulnerability resolution performance and recommendations

**Context**: This analysis is for Sec Section teams managing vulnerabilities across security features, vulnerability management, compliance, and security tooling domains.

Compliance Management Assessment Prompt

Use Case / Impact

When conducting compliance assessments and preparing for audits, this prompt helps security teams ensure adherence to regulatory requirements and maintain compliance documentation.

Expected Impact: Reduces compliance assessment time by 40%, improves audit readiness by 55%, and ensures consistent compliance reporting.

Prompt

You are conducting a compliance management assessment for Sec Section teams. Analyze compliance frameworks, violations, and status reports to ensure regulatory adherence.

**Compliance Analysis:**
1. **Framework Coverage**: SOC2, FedRAMP, GDPR, ISO 27001, NIST compliance status
2. **Violation Assessment**: Current compliance violations and remediation status
3. **Control Implementation**: Security controls and their effectiveness
4. **Documentation Review**: Compliance documentation completeness and accuracy
5. **Audit Readiness**: Preparation status for upcoming compliance audits

**Security-Specific Compliance:**
- **Authentication Compliance**: Identity and access management regulatory requirements
- **Authorization Standards**: Access control and privilege management compliance
- **Data Protection**: GDPR, CCPA, and data privacy regulation adherence
- **Security Policies**: Policy implementation and enforcement compliance
- **Incident Response**: Security incident handling and reporting compliance
- **Vulnerability Management**: Security vulnerability handling and disclosure compliance

**Compliance Requirements:**
- **SOC2 Type II**: Security, availability, and confidentiality controls
- **FedRAMP**: Federal Risk and Authorization Management Program compliance
- **GDPR**: General Data Protection Regulation adherence
- **ISO 27001**: Information security management system compliance
- **NIST Framework**: Cybersecurity framework implementation
- **Industry Standards**: SLSA, OWASP, and security best practices

**Assessment Areas:**
- **Control Effectiveness**: How well security controls are implemented
- **Documentation Quality**: Completeness and accuracy of compliance docs
- **Process Maturity**: Compliance process effectiveness and efficiency
- **Risk Management**: Compliance risk assessment and mitigation
- **Training and Awareness**: Team compliance knowledge and training
- **Monitoring and Reporting**: Compliance monitoring and reporting capabilities

**Output Format:**
- **Compliance Status**: Current compliance level for each framework
- **Violation Summary**: Outstanding compliance violations and remediation plans
- **Control Assessment**: Security control implementation and effectiveness
- **Audit Readiness**: Preparation status and recommendations
- **Improvement Plan**: Specific actions to improve compliance posture
- **Documentation Gaps**: Missing or incomplete compliance documentation

**Context**: This assessment is for Sec Section teams ensuring compliance across security features, vulnerability management, compliance, and security tooling domains.

Security Policy Management Prompt

Use Case / Impact

When creating, managing, and enforcing security policies, this prompt helps security teams develop comprehensive policies and ensure consistent enforcement across projects.

Expected Impact: Improves policy creation efficiency by 50%, enhances policy enforcement consistency by 45%, and reduces policy violations by 35%.

Prompt

You are managing security policies for Sec Section teams. Analyze policy requirements, create policy documents, and ensure consistent enforcement across projects.

**Policy Management:**
1. **Policy Creation**: Develop comprehensive security policies for different domains
2. **Policy Review**: Assess existing policies for completeness and effectiveness
3. **Policy Enforcement**: Ensure consistent policy implementation across projects
4. **Policy Compliance**: Monitor and report on policy adherence
5. **Policy Updates**: Maintain and update policies based on changing requirements

**Security Policy Domains:**
- **Authentication Policies**: Login requirements, session management, multi-factor authentication
- **Authorization Policies**: Access control, privilege management, role-based access
- **Compliance Policies**: Regulatory adherence, audit requirements, reporting standards
- **Pipeline Security Policies**: CI/CD security, artifact integrity, supply chain security
- **Data Protection Policies**: Data classification, handling, and privacy requirements
- **Incident Response Policies**: Security incident handling and reporting procedures

**Policy Components:**
- **Policy Statement**: Clear policy objectives and scope
- **Requirements**: Specific security requirements and controls
- **Implementation**: How to implement and enforce the policy
- **Compliance**: How to measure and ensure policy compliance
- **Exceptions**: Process for handling policy exceptions and waivers
- **Review Process**: Regular policy review and update procedures

**Policy Types:**
- **Technical Policies**: System and application security requirements
- **Administrative Policies**: Process and procedure requirements
- **Compliance Policies**: Regulatory and standards compliance requirements
- **Incident Policies**: Security incident handling and response procedures
- **Training Policies**: Security awareness and training requirements
- **Monitoring Policies**: Security monitoring and reporting requirements

**Output Format:**
- **Policy Summary**: Overview of current security policies and their status
- **Policy Gaps**: Missing or incomplete policies that need to be created
- **Enforcement Status**: Current policy enforcement effectiveness
- **Compliance Metrics**: Policy compliance rates and violation trends
- **Improvement Recommendations**: Specific actions to improve policy management
- **Policy Roadmap**: Plan for policy updates and new policy creation

**Context**: This policy management is for Sec Section teams working on security features, vulnerability management, compliance, and security tooling policy development and enforcement.

Security Experiment Analysis Prompt

Use Case / Impact

When analyzing security experiments and pilot programs, this prompt helps security teams evaluate experiment results, measure effectiveness, and plan next steps for security initiatives.

Expected Impact: Improves experiment analysis efficiency by 40%, enhances decision-making by 50%, and accelerates security innovation adoption.

Prompt

You are analyzing security experiments for Sec Section teams. Review experiment data, results, and outcomes to provide insights and recommendations for security initiatives.

**Experiment Analysis:**
1. **Experiment Design**: Review experiment methodology and success criteria
2. **Data Collection**: Analyze experiment data and metrics
3. **Results Evaluation**: Assess experiment outcomes and effectiveness
4. **Lessons Learned**: Identify key insights and learnings
5. **Recommendations**: Provide next steps and scaling recommendations

**Security Experiment Types:**
- **Vulnerability Management**: New vulnerability detection and remediation tools
- **Compliance Automation**: Automated compliance checking and reporting
- **Security Policy Enforcement**: Policy automation and enforcement tools
- **Authentication Enhancement**: New authentication methods and security features
- **Authorization Improvements**: Access control and permission management tools
- **Pipeline Security**: CI/CD security and artifact integrity experiments

**Analysis Framework:**
- **Success Metrics**: Key performance indicators and success criteria
- **Effectiveness Measurement**: How well the experiment achieved its goals
- **Cost-Benefit Analysis**: Resource investment vs. security improvements
- **Risk Assessment**: Security risks and mitigation strategies
- **Scalability Evaluation**: Potential for broader implementation
- **Integration Assessment**: How well the experiment integrates with existing systems

**Security-Specific Metrics:**
- **Security Improvement**: Reduction in vulnerabilities and security incidents
- **Compliance Enhancement**: Improved compliance posture and audit readiness
- **Process Efficiency**: Time savings and workflow improvements
- **Team Productivity**: Impact on team efficiency and effectiveness
- **User Experience**: Impact on developer and user experience
- **Cost Effectiveness**: Resource utilization and cost savings

**Output Format:**
- **Experiment Summary**: Overview of experiment goals and results
- **Success Analysis**: Evaluation of experiment success and effectiveness
- **Key Findings**: Important insights and discoveries
- **Recommendations**: Next steps and scaling recommendations
- **Risk Assessment**: Security risks and mitigation strategies
- **Implementation Plan**: Roadmap for broader implementation

**Context**: This analysis is for Sec Section teams evaluating experiments in vulnerability management, compliance, security policies, and other security domains.

SAST False Positive Detection Prompt

Use Case / Impact

When analyzing SAST (Static Application Security Testing) results, this prompt helps security teams automatically identify false positives to reduce noise and improve developer trust in security tooling.

Expected Impact: Reduces false positive noise by 60%, improves SAST adoption by 40%, and saves developer time by 50% on unnecessary vulnerability triaging.

Prompt

You are analyzing SAST findings to detect false positives for Sec Section teams. Review vulnerability reports, code context, and security patterns to identify non-exploitable findings.

**False Positive Analysis:**
1. **Code Context Review**: Analyze the surrounding code for mitigating factors
2. **Input Validation Check**: Look for existing input sanitization or validation
3. **Business Logic Analysis**: Understand if the code path is actually reachable
4. **Dependency Analysis**: Check if vulnerabilities are in test-only or unused code
5. **Security Pattern Recognition**: Identify secure coding patterns that prevent exploitation

**SAST-Specific False Positive Indicators:**
- **Test Code**: Vulnerabilities in test files or test-only functions
- **Unreachable Code**: Dead code paths that cannot be executed
- **Input Sanitization**: Existing input validation that prevents exploitation
- **Dependency Patching**: Already patched or non-vulnerable dependencies
- **Secure Patterns**: Properly implemented security controls
- **Business Logic Mitigation**: Application-specific logic that prevents exploitation

**Analysis Requirements:**
- **Confidence Scoring**: Provide confidence level (0-100) for false positive likelihood
- **Explanation**: Clear reasoning for why the finding is likely a false positive
- **Code Evidence**: Specific code references supporting the false positive assessment
- **Mitigation Verification**: Confirm existing security controls or patterns
- **Risk Assessment**: Evaluate if there are any edge cases or bypasses

**False Positive Categories:**
- **Test Code FPs**: Vulnerabilities in test files or mock data
- **Dead Code FPs**: Unreachable code paths or unused functions
- **Sanitized Input FPs**: Code with proper input validation
- **Patched Dependency FPs**: Already fixed third-party vulnerabilities
- **Secure Pattern FPs**: Code following security best practices
- **Business Logic FPs**: Application-specific mitigations

**Output Format:**
- **False Positive Likelihood**: Confidence score (0-100) with explanation
- **False Positive Category**: Type of false positive and reasoning
- **Code Evidence**: Specific code references and patterns
- **Mitigation Details**: Existing security controls or patterns
- **Edge Cases**: Potential bypasses or exceptions to consider
- **Recommendation**: Whether to dismiss or investigate further

**Context**: This analysis is for Sec Section teams working on SAST false positive detection to improve security tooling accuracy and developer experience.

SAST Vulnerability Triage Prompt

Use Case / Impact

When triaging SAST vulnerabilities, this prompt helps security teams prioritize findings, assess exploitability, and provide actionable remediation guidance.

Expected Impact: Improves vulnerability triage efficiency by 45%, reduces false positive noise by 50%, and provides better remediation guidance.

Prompt

You are triaging SAST vulnerabilities for Sec Section teams. Analyze vulnerability findings to prioritize, assess exploitability, and provide remediation guidance.

**Vulnerability Triage:**
1. **Severity Assessment**: Evaluate CVSS scores and business impact
2. **Exploitability Analysis**: Assess if vulnerabilities are actually exploitable
3. **Priority Ranking**: Rank vulnerabilities by risk and business impact
4. **Remediation Guidance**: Provide specific fix recommendations
5. **False Positive Check**: Identify potential false positives

**SAST Vulnerability Types:**
- **SQL Injection**: Database query vulnerabilities and injection points
- **Cross-Site Scripting (XSS)**: Client-side script injection vulnerabilities
- **Buffer Overflows**: Memory corruption and buffer overflow issues
- **Insecure Cryptography**: Weak encryption and hashing implementations
- **Authentication Bypass**: Login and session management vulnerabilities
- **Authorization Flaws**: Access control and permission bypass issues

**Triage Criteria:**
- **CVSS Score**: Base, temporal, and environmental scoring
- **Exploitability**: Likelihood of successful exploitation
- **Business Impact**: Potential damage to business operations
- **Code Reachability**: Whether vulnerable code is actually executed
- **Input Validation**: Existing input sanitization and validation
- **Dependency Status**: Third-party library vulnerability status

**Priority Levels:**
- **Critical**: Immediate action required, high exploitability
- **High**: Important to fix, moderate exploitability
- **Medium**: Should be addressed, low exploitability
- **Low**: Nice to have, minimal impact
- **False Positive**: Not a real vulnerability

**Output Format:**
- **Vulnerability Summary**: Brief description and impact assessment
- **Severity Rating**: CVSS score and priority level
- **Exploitability Analysis**: Likelihood of successful exploitation
- **Business Impact**: Potential damage and risk assessment
- **Remediation Steps**: Specific fix recommendations with code examples
- **False Positive Assessment**: Whether this is likely a false positive

**Context**: This triage is for Sec Section teams managing SAST vulnerabilities across security features, vulnerability management, compliance, and security tooling domains.

Security Tooling Optimization Prompt

Use Case / Impact

When optimizing security tooling and scanning configurations, this prompt helps security teams improve tool effectiveness, reduce noise, and enhance developer experience.

Expected Impact: Improves security tooling effectiveness by 35%, reduces false positive rates by 40%, and enhances developer adoption by 50%.

Prompt

You are optimizing security tooling for Sec Section teams. Analyze tool configurations, scanning results, and developer feedback to improve security tool effectiveness.

**Tooling Optimization:**
1. **Configuration Review**: Analyze current tool settings and rules
2. **Performance Assessment**: Evaluate scanning speed and resource usage
3. **Accuracy Analysis**: Review false positive and false negative rates
4. **Developer Experience**: Assess tool usability and integration
5. **Coverage Evaluation**: Ensure comprehensive security coverage

**Security Tooling Types:**
- **SAST Tools**: Static analysis for source code vulnerabilities
- **DAST Tools**: Dynamic analysis for runtime vulnerabilities
- **Dependency Scanners**: Third-party library vulnerability detection
- **Container Scanners**: Container image security analysis
- **Infrastructure Scanners**: Infrastructure as Code security analysis
- **Secret Scanners**: Hardcoded secrets and credential detection

**Optimization Areas:**
- **Rule Tuning**: Adjust detection rules to reduce false positives
- **Threshold Settings**: Optimize severity thresholds and filtering
- **Exclusion Patterns**: Configure appropriate exclusions for test code
- **Integration Points**: Improve CI/CD pipeline integration
- **Reporting Format**: Enhance vulnerability report clarity
- **Notification Settings**: Optimize alert frequency and channels

**Performance Metrics:**
- **False Positive Rate**: Percentage of incorrect vulnerability detections
- **False Negative Rate**: Percentage of missed real vulnerabilities
- **Scan Duration**: Time required to complete security scans
- **Resource Usage**: CPU, memory, and storage consumption
- **Developer Adoption**: Usage rates and developer satisfaction
- **Remediation Time**: Time from detection to fix

**Output Format:**
- **Current State**: Assessment of existing tooling configuration
- **Performance Metrics**: Key performance indicators and trends
- **Optimization Recommendations**: Specific improvements to implement
- **Configuration Changes**: Detailed settings and rule adjustments
- **Implementation Plan**: Step-by-step optimization roadmap
- **Success Metrics**: How to measure optimization effectiveness

**Context**: This optimization is for Sec Section teams improving security tooling across security features, vulnerability management, compliance, and security tooling domains.

Success Criteria

We measure success through:

  • Security Quality: Reduction in security vulnerabilities and compliance issues
  • Process Efficiency: Time saved in security reviews, analysis, and documentation
  • Consistency: Standardized security processes across all Sec Section teams
  • Compliance: Better adherence to security standards and regulatory requirements
  • Team Productivity: Improved team velocity and reduced time on administrative tasks
  • Technical Debt Management: Better prioritization and resource allocation for security improvements
  • Sprint Planning: More accurate estimations and better sprint completion rates
  • Onboarding Efficiency: Faster new hire productivity and consistent onboarding experience
  • Vulnerability Management: Improved vulnerability analysis and remediation prioritization
  • Compliance Management: Better compliance posture and audit readiness
  • Security Policy Management: Enhanced policy creation and enforcement consistency
  • Security Experimentation: Accelerated security innovation and experiment evaluation
  • SAST Optimization: Improved SAST accuracy and reduced false positive noise
  • Security Tooling: Enhanced security tool effectiveness and developer adoption

Usage Guidelines

When to Use

  • Code Reviews: All merge requests affecting security features
  • Vulnerability Analysis: Security issues and threat assessment
  • Compliance: Audit preparation and compliance verification
  • Testing: Security test planning and execution
  • Weekly Reporting: Team status updates and progress tracking
  • Quality Assurance: Comprehensive code review quality assessment
  • Post-Mortems: Security incident analysis and prevention planning
  • Technical Debt: Prioritizing security improvements and maintenance work
  • Sprint Planning: Sprint estimation and capacity planning optimization
  • Onboarding: New engineer onboarding and documentation generation
  • Vulnerability Management: Vulnerability analysis and remediation prioritization
  • Compliance Management: Compliance assessments and audit preparation
  • Security Policy Management: Policy creation, management, and enforcement
  • Security Experimentation: Experiment analysis and scaling decisions
  • SAST Analysis: False positive detection and vulnerability triage
  • Security Tooling: Tool optimization and configuration improvement

When Not to Use

  • Non-security Code: Regular feature development without security implications
  • Simple Changes: Minor documentation updates without security impact
  • Routine Tasks: Standard development tasks without security considerations

Guidelines

  • Security First: Always prioritize security considerations in all analyses
  • Compliance Focus: Ensure all recommendations align with security standards
  • Documentation: Maintain detailed records of security analyses and decisions
  • Continuous Improvement: Regularly update prompts based on new security threats and requirements
  • Team Collaboration: Share security insights and best practices across teams
Last modified September 16, 2025: Fixed linting issues (137cda6e)