PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
Chat - GPT-4o (gpt-4o)
Token size
69 ($0.00345 / call)
Example input
[research domain]: decentralized finance (DeFi) system vulnerabilities and regulatory challenges [investigation methodology]: multi-level system risk assessment with regulatory gap analysis [query construction procedure]: protocol architecture mapping across DeFi components and interactions; technical vulnerability identification through security audit reports; financial risk assessment through economic incentive analysis; regulatory framework evaluation across jurisdictions; exploit incident investigation through post-mortem analyses; stakeholder incentive alignment assessment through governance structures; regulatory enforcement capability evaluation across agencies; and systemic contagion pathway identification through interoperability assessment [implementation format]: a financial technology risk framework including: (1) system architecture mapping identifying components and dependencies, (2) vulnerability search strategy across technical and economic attack vectors, (3) incident history query design documenting exploit patterns and magnitudes, (4) regulatory approach comparison across different jurisdictions, (5) enforcement capability assessment identifying regulatory tools and limitations, (6) stakeholder analysis examining incentive structures and behaviors, (7) systemic risk query framework tracking contagion pathways between protocols, and (8) governance mechanism evaluation template comparing approaches to protocol security
Example output
Here's a comprehensive deep research search query framework tailored for analyzing Decentralized Finance (DeFi) system vulnerabilities and regulatory challenges, utilizing a multi-level system risk assessment with regulatory gap analysis approach. --- ### 🔍 DeFi Risk & Regulatory Challenge Search Query Framework This framework is structured by a Financial Technology Risk Framework, enabling systematic discovery, evaluation, and synthesis of DeFi-specific vulnerabilities and regulatory gaps across technical, economic, and institutional layers. --- ## 1. System Architecture Mapping: Components & Dependencies ### Objective: Identify key architectural components, interactions, and protocol dependencies within DeFi ecosystems. #### Search Keywords/Queries: - `"DeFi protocol architecture diagram" OR "DeFi system design overview"` - `"smart contract dependency mapping" AND ("Uniswap" OR "Aave" OR "Curve" OR "Compound")` - `"cross-protocol interactions" AND "liquidity bridges"` - `"DeFi composability" AND "architecture"` - `"DeFi component taxonomy" AND "interoperability"` #### Data Sources: - Whitepapers, GitHub repos - Protocol documentation (e.g., MakerDAO, Aave) - Research papers on protocol composability (arXiv, SSRN) --- ## 2. Technical & Economic Vulnerability Search Strategy ### Objective: Identify and categorize attack vectors (smart contract bugs, oracle manipulation, economic exploits). #### Search Keywords/Queries: - `"DeFi vulnerability audit report" OR "DeFi protocol security audit"` - `"flash loan exploit" AND "vulnerability analysis"` - `"oracle manipulation attack" OR "price feed vulnerability"` - `"economic design flaw" AND "DeFi protocol"` - `"front-running MEV" AND "DeFi"` #### Data Sources: - Audit firms (e.g., Trail of Bits, Certik, OpenZeppelin) - Smart contract security blogs - arXiv papers on DeFi exploit types --- ## 3. Exploit Incident History Query Design ### Objective: Document past exploit events, analyze patterns and exploit mechanisms. #### Search Keywords/Queries: - `"DeFi hack post-mortem" OR "exploit incident report"` - `"top DeFi exploits" AND "attack vector analysis"` - `"DeFi security breach history" AND "loss magnitude"` - `"reentrancy attacks in DeFi"` - `"smart contract bugs exploited"` #### Data Sources: - Rekt.news exploit reports - Chainalysis DeFi crime reports - Security conference proceedings --- ## 4. Regulatory Framework Comparison Across Jurisdictions ### Objective: Evaluate regulatory treatment of DeFi in global regions. #### Search Keywords/Queries: - `"DeFi regulation comparison" AND ("EU" OR "USA" OR "Singapore" OR "UAE")` - `"crypto regulation" AND "DeFi protocols"` - `"jurisdictional DeFi regulation analysis"` - `"regulatory perimeter" AND "decentralized finance"` - `"MiCA" AND "DeFi" OR "SEC enforcement on DeFi"` #### Data Sources: - OECD/FSB/IMF DeFi regulatory reports - FATF guidance papers - Country-specific financial authority statements --- ## 5. Regulatory Enforcement Capability Assessment ### Objective: Assess regulators’ tools, reach, and enforcement limitations in decentralized contexts. #### Search Keywords/Queries: - `"DeFi enforcement limitations" AND "regulatory oversight"` - `"regulatory arbitrage" AND "DeFi"` - `"SEC" OR "CFTC" AND "DeFi enforcement actions"` - `"regulatory capability gap" AND "autonomous protocols"` - `"DAO legal status" AND "compliance mechanisms"` #### Data Sources: - Legal journals, regulatory case studies - Financial enforcement agency press releases - Think tank analyses (e.g., Brookings, CEPR) --- ## 6. Stakeholder Incentive & Governance Structure Assessment ### Objective: Analyze DeFi governance mechanisms and alignments of incentives among participants (developers, token holders, users, attackers). #### Search Keywords/Queries: - `"DeFi governance structure analysis"` - `"DAO voting mechanism" AND "incentive alignment"` - `"token governance attack" OR "governance capture"` - `"treasury governance" AND "DeFi protocol"` - `"delegated voting in DAOs"` #### Data Sources: - Snapshot governance proposals - Tokenomics whitepapers - Governance forum discussions --- ## 7. Systemic Contagion Pathway Identification ### Objective: Map out how vulnerabilities in one protocol propagate to others via composability and liquidity bridges. #### Search Keywords/Queries: - `"DeFi protocol contagion risk" OR "interconnected risk"` - `"cross-protocol liquidity risk"` - `"DeFi systemic risk" AND "bridge vulnerabilities"` - `"cascading failures" AND "DeFi composability"` - `"inter-protocol dependency risk"` #### Data Sources: - Multichain exploit post-mortems - DeFi systemic risk models (academic papers) - Ethereum research forums --- ## 8. Governance Mechanism Evaluation Template ### Objective: Compare governance designs and their impact on protocol adaptability, security, and resilience. #### Search Keywords/Queries: - `"comparative DAO governance models"` - `"DeFi protocol governance analysis" AND "security outcomes"` - `"on-chain vs off-chain governance"` - `"governance token distribution" AND "decentralization"` - `"emergency multisig governance"` #### Data Sources: - DAO governance dashboards (e.g., Tally, DeepDAO) - Protocol governance blogs - Comparative studies in crypto law journals --- ## 📊 Evidence Evaluation Strategy - Source Reliability Scoring: Weight academic, regulatory, and audit sources higher. - Recency Filter: Emphasize findings from the past 2 years to reflect evolving risks. - Cross-Validation: Confirm exploit narratives across at least 2 independent sources. - Data Triangulation: Integrate on-chain data (e.g., Dune Analytics), post-mortems, and protocol governance logs. --- ## 🔄 Integrated Knowledge Synthesis Workflow 1. Extract: Capture metadata from each source (title, date, protocol, type of risk). 2. Categorize: Tag content according to the 8 risk framework dimensions. 3. Visualize: Use mind maps or risk matrices to model vulnerabilities and dependencies. 4. Evaluate Gaps: Overlay findings with regulatory coverage to highlight oversight blind spots. 5. Generate Insights: Identify areas where technical risk is high but regulation is weak or misaligned. --- Would you like a template spreadsheet or database schema to track and analyze findings from this framework?
🤖 GPT

Deep Research Search Query Generator

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
GPT-4O
Tested icon
Guide icon
4 examples icon
Free credits icon
This template generates precisely calibrated search strategies that guide researchers through systematic information discovery, evidence evaluation, and insight development tailored to specific research domains, investigative objectives, methodological approaches, and knowledge integration requirements. --- Optimized prompt for Deep Research mode in Gemini, ChatGPT, and Perplexity
...more
Added over 1 month ago
Report
  • Reviews for this prompt (3)
Browse Marketplace