PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
(claude-3-5-sonnet)
Token size
264
Example input
[TARGET_DOMAIN]: Type: Web Application - Stack: MEAN - Complexity: 4 [RESEARCH_SCOPE]: - Depth: Comprehensive - Focus: Architecture - Timeline: 4 weeks [METHODOLOGY_TYPE]: - Approach: Grey box - Documentation: Full - Format: Technical Report
Example output
# Security Research Methodology: MEAN Stack Web Application ## 1. Research Architecture ### Attack Surface Mapping - External interfaces: REST APIs, user interfaces, authentication endpoints - Data flow paths: Client-server communications, database interactions - Asset inventory: MongoDB collections, Express routes, Angular components - Integration points: Third-party services, APIs, CDNs ### Threat Modeling Framework - STRIDE analysis for each component - Trust boundaries between MEAN stack layers - Data classification matrix - Access control mapping ### Vulnerability Assessment Matrix | Component | Test Cases | Tools | Priority | |-------------|------------|-------|----------| | MongoDB | NoSQL injection, access controls | MongoDB security scanner | P1 | | Express | Route security, middleware analysis | Static analysis, DAST | P1 | | Angular | Client-side validation, XSS vectors | Browser security tools | P2 | | Node.js | Dependency analysis, server config | SAST, composition analysis | P1 | ### Risk Prioritization System - Critical: Authentication bypass, RCE, data exposure - High: Authorization flaws, injection vulnerabilities - Medium: Security misconfigurations, weak crypto - Low: Information disclosure, best practice violations ## 2. Analysis Protocol ### Pattern Recognition Framework - Architecture patterns analysis - MVC implementation review - State management assessment - Data flow validation - Security anti-patterns identification - Input validation gaps - Authentication weaknesses - Authorization flaws ### Impact Assessment Methodology 1. Technical Impact - Data confidentiality - System integrity - Service availability 2. Business Impact - Regulatory compliance - Reputation risk - Financial exposure ### Root Cause Analysis Structure 1. Vulnerability discovery 2. Technical deep-dive 3. Contributing factors 4. Systemic issues 5. Architecture implications ### Evidence Documentation System - Screenshots: UI vulnerabilities, configuration issues - Network captures: API security issues, data leaks - Code snippets: Implementation flaws - Logs: Security events, exploitation attempts ## 3. Documentation Matrix ### Finding Classification System - ID: [YEAR]-[COMPONENT]-[VULNTYPE]-[NUMBER] - Severity: CVSS v3.1 scoring - Category: CWE mapping - Status tracking ### Technical Writing Framework 1. Executive Summary - Key findings - Risk assessment - Remediation roadmap 2. Technical Details - Vulnerability analysis - Proof of concept - Impact assessment 3. Recommendations - Short-term fixes - Long-term architecture improvements - Security controls enhancement ### Recommendation Template ``` Finding: [ID] Description: Clear, technical explanation Impact: Business and technical implications Remediation: - Immediate actions - Architecture changes - Control improvements Validation: Testing procedures for fixes ``` ## Timeline Breakdown Week 1: Architecture analysis, setup Week 2: Component security assessment Week 3: Deep-dive testing, exploitation Week 4: Documentation, reporting The framework includes comprehensive coverage of the MEAN stack with grey-box testing approach. Key features: 1. Component-specific security testing 2. Systematic documentation structure 3. Timeline-aligned deliverables 4. Risk-based prioritization Need any specific section expanded or modified?
🌀 Claude

Advanced Security Research Architecture

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
CLAUDE-3-5-SONNET
Tested icon
Guide icon
4 examples icon
Free credits icon
💡 Transform security research into structured, professional methodologies 🔒 Enterprise-grade framework combining OWASP standards, industry best practices, and advanced analytical patterns ✨ Perfect for security researchers, pentesters, and security architects ⚡️ Generate comprehensive research frameworks in minutes
...more
Added over 1 month ago
Report
  • Reviews for this prompt (1)
Browse Marketplace