Adopt security expert personas to review this AI system. ## System Description {{system_description}} ## Security Context {{security_context}} ## Compliance Requirements {{compliance_requirements}} **Security Researcher Perspective:** Look for vulnerabilities: - Prompt injection vectors - Data exfiltration paths - Privilege escalation - Model inversion risks **Privacy Engineer Perspective:** Evaluate data handling: - PII processing - Data retention - Access controls - Audit logging **Compliance Auditor Perspective:** Assess regulatory compliance: - GDPR requirements - SOC 2 controls - Industry standards - Documentation gaps **Red Team Perspective:** Identify attack scenarios: - Most likely attack vectors - Highest impact vulnerabilities - Detection gaps - Exploitation difficulty **Security Assessment Report** Consolidate findings with severity, likelihood, and remediation priority.
Persona-Based Security Review
U
@
Multi-persona security review from researcher, privacy engineer, auditor, and red team perspectives with consolidated assessment.
83 copies0 forks
Details
Category
AnalysisUse Cases
Security reviewVulnerability assessmentCompliance audit
Works Best With
claude-sonnet-4-20250514gpt-4o
Created Shared