Security Vulnerability Severity Rating

D

Daniel Okoye

@daniel-okoye

·

Rate security vulnerabilities using CVSS-like examples for consistency.

43 copies0 forks
Rate this security vulnerability severity using the examples.

Examples:
- "SQL injection in public search endpoint" → Critical (CVSS 9.8) - RCE potential, no auth required
- "IDOR in user profile API" → High (CVSS 7.5) - Data exposure, auth required
- "Missing rate limiting on login" → Medium (CVSS 5.3) - Brute force possible, mitigated by lockout
- "Verbose error messages in API" → Low (CVSS 3.1) - Information disclosure, limited impact

Vulnerability: {{vulnerability_description}}
Affected endpoint: {{endpoint}}
Authentication required: {{auth_required}}

Rate with: Severity, CVSS estimate, attack vector, recommended timeline.

Details

Category

Coding

Use Cases

Security issue triageVulnerability prioritizationSecurity review support

Works Best With

claude-opus-4.5gpt-5.2gemini-2.0-flash
Created Updated Shared

Create your own prompt vault and start sharing