Prompt Details
Model
Chat - (gpt-5.2)
Token size
394
Example input
[CODE_TO_REVIEW]: String query = "SELECT * FROM users WHERE id=" + userId; ResultSet rs = stmt.executeQuery(query);
[LANGUAGE_FRAMEWORK]: Java / JDBC
[CONTEXT]: Database query function
[EXPERIENCE_LEVEL]: Junior
[REVIEW_FOCUS]: Security
Example output
## 📊 REVIEW SUMMARY
- **Overall Score:** 4/10 - Security issues detected
- **Strengths:** Clear naming, simple structure
- **Primary Concerns:** 1) SQL Injection, 2) No logging, 3) Missing null checks
- **Time to fix:** 30 minutes
## 🔴 CRITICAL ISSUES (Must Fix)
### 1. SQL Injection Vulnerability
- **Issue:** String concatenation in SQL query
- **Risk:** Database compromise, data theft
- **Fix:** Use parameterized queries
## 💬 PR COMMENT SUMMARY
Critical SQL injection vulnerability found. Use prepared statements with parameters instead of string concatenation. Block merge until fixed.
By purchasing this prompt, you agree to our terms of service
GPT-5.2
Get expert code reviews instantly. Transform ChatGPT into a senior tech lead who analyzes your code for security vulnerabilities, performance issues, and best practices. Receive prioritized feedback with critical issues, warnings, and suggestions plus complete refactored code and PR-ready comments.
...more
Added over 1 month ago
