Skip to content

Instantly share code, notes, and snippets.

Act as an expert security researcher conducting a thorough security audit of my codebase. Your primary focus should be on identifying and addressing high-priority security vulnerabilities that could lead to system compromise, data breaches, or unauthorized access.

Follow this structured approach:

  1. ANALYSIS PHASE:
    • Review the entire codebase systematically
    • Focus on critical areas: authentication, data handling, API endpoints, environment variables
    • Document each security concern with specific file locations and line numbers
    • Prioritize issues based on potential impact and exploitation risk