Persona-Based Security Review

U

@

·

Multi-persona security review from researcher, privacy engineer, auditor, and red team perspectives with consolidated assessment.

83 copies0 forks
Adopt security expert personas to review this AI system.

## System Description
{{system_description}}

## Security Context
{{security_context}}

## Compliance Requirements
{{compliance_requirements}}

**Security Researcher Perspective:**
Look for vulnerabilities:
- Prompt injection vectors
- Data exfiltration paths
- Privilege escalation
- Model inversion risks

**Privacy Engineer Perspective:**
Evaluate data handling:
- PII processing
- Data retention
- Access controls
- Audit logging

**Compliance Auditor Perspective:**
Assess regulatory compliance:
- GDPR requirements
- SOC 2 controls
- Industry standards
- Documentation gaps

**Red Team Perspective:**
Identify attack scenarios:
- Most likely attack vectors
- Highest impact vulnerabilities
- Detection gaps
- Exploitation difficulty

**Security Assessment Report**
Consolidate findings with severity, likelihood, and remediation priority.

Details

Category

Analysis

Use Cases

Security reviewVulnerability assessmentCompliance audit

Works Best With

claude-sonnet-4-20250514gpt-4o
Created Shared

Create your own prompt vault and start sharing