PromptBase
Close icon
General
Home
Marketplace
Hire
Create
Login
Sell
Explore
🌀 Claude

Advanced Security Research Architecture

Advanced Security Research Architecture claude prompt mini thumbnail
14Eye icon
Views
CLAUDE-3-5-SONNET
TestedTick icon
TipsTick icon
4 examplesTick icon
💡 Transform security research into structured, professional methodologies 🔒 Enterprise-grade framework combining OWASP standards, industry best practices, and advanced analytical patterns ✨ Perfect for security researchers, pentesters, and security architects ⚡️ Generate comprehensive research frameworks in minutes
...more
$9.99
Get prompt
After purchasing, you will gain access to the prompt file which you can use with Claude or the app builder. You'll receive 20 free generation credits with this purchase. By purchasing this prompt, you agree to our terms of service.
2 weeks ago
Related item

Prompt Details

Model
(claude-3-5-sonnet)
Token size
264
Example input
[TARGET_DOMAIN]: Type: Web Application - Stack: MEAN - Complexity: 4 [RESEARCH_SCOPE]: - Depth: Comprehensive - Focus: Architecture - Timeline: 4 weeks [METHODOLOGY_TYPE]: - Approach: Grey box - Documentation: Full - Format: Technical Report
Example output
# Security Research Methodology: MEAN Stack Web Application ## 1. Research Architecture ### Attack Surface Mapping - External interfaces: REST APIs, user interfaces, authentication endpoints - Data flow paths: Client-server communications, database interactions - Asset inventory: MongoDB collections, Express routes, Angular components - Integration points: Third-party services, APIs, CDNs ### Threat Modeling Framework - STRIDE analysis for each component - Trust boundaries between MEAN stack layers - Data classification matrix - Access control mapping ### Vulnerability Assessment Matrix | Component | Test Cases | Tools | Priority | |-------------|------------|-------|----------| | MongoDB | NoSQL injection, access controls | MongoDB security scanner | P1 | | Express | Route security, middleware analysis | Static analysis, DAST | P1 | | Angular | Client-side validation, XSS vectors | Browser security tools | P2 | | Node.js | Dependency analysis, server config | SAST, composition analysis | P1 | ### Risk Prioritization System - Critical: Authentication bypass, RCE, data exposure - High: Authorization flaws, injection vulnerabilities - Medium: Security misconfigurations, weak crypto - Low: Information disclosure, best practice violations ## 2. Analysis Protocol ### Pattern Recognition Framework - Architecture patterns analysis - MVC implementation review - State management assessment - Data flow validation - Security anti-patterns identification - Input validation gaps - Authentication weaknesses - Authorization flaws ### Impact Assessment Methodology 1. Technical Impact - Data confidentiality - System integrity - Service availability 2. Business Impact - Regulatory compliance - Reputation risk - Financial exposure ### Root Cause Analysis Structure 1. Vulnerability discovery 2. Technical deep-dive 3. Contributing factors 4. Systemic issues 5. Architecture implications ### Evidence Documentation System - Screenshots: UI vulnerabilities, configuration issues - Network captures: API security issues, data leaks - Code snippets: Implementation flaws - Logs: Security events, exploitation attempts ## 3. Documentation Matrix ### Finding Classification System - ID: [YEAR]-[COMPONENT]-[VULNTYPE]-[NUMBER] - Severity: CVSS v3.1 scoring - Category: CWE mapping - Status tracking ### Technical Writing Framework 1. Executive Summary - Key findings - Risk assessment - Remediation roadmap 2. Technical Details - Vulnerability analysis - Proof of concept - Impact assessment 3. Recommendations - Short-term fixes - Long-term architecture improvements - Security controls enhancement ### Recommendation Template ``` Finding: [ID] Description: Clear, technical explanation Impact: Business and technical implications Remediation: - Immediate actions - Architecture changes - Control improvements Validation: Testing procedures for fixes ``` ## Timeline Breakdown Week 1: Architecture analysis, setup Week 2: Component security assessment Week 3: Deep-dive testing, exploitation Week 4: Documentation, reporting The framework includes comprehensive coverage of the MEAN stack with grey-box testing approach. Key features: 1. Component-specific security testing 2. Systematic documentation structure 3. Timeline-aligned deliverables 4. Risk-based prioritization Need any specific section expanded or modified?
Browse Marketplace