AI 提示詞: 資訊安全

💡 AI 模型在英文提示詞下表現最佳。因此,提示詞本文以英文呈現。使用英文輸入可獲得更準確、更詳細的回應。 資安事件不只發生在大公司——任何沒有準備的人都可能遇到。這 7 個提示詞幫你根據真實攻擊模式稽核系統、建構映射實際攻擊面的威脅模型、在需要之前建立事件應變手冊,以及導航合規框架而不被文書淹沒。已在 GPT-4.1、Gemini 2.5 Pro、Claude Sonnet 4 和 Grok 3 上實測,讓你知道哪個模型最能保護你的系統。

最近測試日期 Mar 15, 2026 · 模型: GPT-4.1, Gemini 2.5 Pro, Claude Sonnet 4, Grok 3

應用程式安全稽核師

根據 OWASP Top 10 和真實攻擊模式稽核你的應用程式

Conduct a comprehensive security audit of my application.

Application type: [web app / mobile app / API / SaaS platform / internal tool]
Stack: [languages, frameworks, databases, cloud provider, CDN]
Authentication: [JWT / sessions / OAuth 2.0 / SAML / API keys / multi-factor]
Sensitive data: [PII, payment data, health records, credentials, API keys]
Current security measures: [what you already have: WAF, encryption, rate limiting, etc.]
Compliance requirements: [GDPR / HIPAA / SOC2 / PCI-DSS / ISO 27001 / none yet]
Last security review: [when, or 'never']
Known vulnerabilities: [any issues you're already aware of]

Audit and provide:
1. **OWASP Top 10 assessment:** for each of the 10 categories, assess whether your stack is vulnerable, what the specific risk is, and the remediation priority (critical/high/medium/low)
2. **Authentication & authorization review:** password hashing algorithm, session management, token lifecycle, privilege escalation risks, broken access control patterns
3. **Data protection audit:** encryption at rest and in transit, key management, data classification, PII exposure in logs/errors/analytics
4. **Infrastructure security:** cloud configuration, secrets management, network segmentation, container security (if applicable)
5. **Dependency scan guidance:** how to identify vulnerable dependencies, which tools to use for your stack, and the triage process
6. **Top 5 immediate actions:** ranked by risk reduction per hour of effort. Specific fixes, not general advice
7. **30-day security roadmap:** week-by-week plan to reach baseline security posture, prioritized by business impact of a breach

進階技巧

即使尚未合規,也請加入你的合規要求。AI 在知道你需要 SOC2 與一般審查時,會建構截然不同的安全路線圖。而且對尚未到位的部分要誠實——稽核只有反映現實才有用,而非理想版本。

已測試 Mar 15, 2026

威脅模型建構師

繪製你的攻擊面並排定防禦優先順序

Help me build a threat model for my application.

Application: [describe what it does and how users interact with it]
Architecture: [describe system components, services, databases, and how they connect]
Data flow: [how data moves through the system — user input → API → database → response]
Assets to protect: [most valuable data and functionality — what would hurt most if compromised]
User types: [roles and their access levels: admin, user, anonymous, API consumer]
External integrations: [third-party services, payment processors, analytics, CDN]
Previous incidents: [any known security issues, near-misses, or breach attempts]
Threat actors: [who might attack you: opportunistic hackers, competitors, insiders, nation-states]

Build a complete threat model:
1. **Asset inventory:** what's worth protecting, ranked by business impact if compromised (confidentiality, integrity, availability)
2. **Trust boundary map:** where data crosses security boundaries. Each boundary is a potential attack surface
3. **STRIDE analysis:** for each major component, assess Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege risks
4. **Attack tree:** for your top 3 assets, map the attack paths an adversary could take. Include both technical and social engineering vectors
5. **Risk matrix:** likelihood × impact scoring for each identified threat. Color-coded: red/yellow/green
6. **Mitigation plan:** for the top 10 highest-risk threats, specific countermeasures with implementation effort estimates
7. **Residual risk acceptance:** for threats you can't fully mitigate, document the accepted risk and monitoring strategy

進階技巧

提供你的資料流,而非僅是架構圖。威脅存在於資料在元件間移動的地方——信任邊界、API 呼叫、資料庫查詢和第三方整合。沒有資料流的系統圖就像沒有道路的地圖。同時說明對攻擊者來說最有價值的資料是什麼。

已測試 Mar 15, 2026

資安事件應變手冊

在資安事件發生前做好準備

Help me create a security incident response plan.

Organization: [size, industry, and IT/security team capacity]
Infrastructure: [cloud / on-premise / hybrid — and which providers]
Data sensitivity: [types of regulated or sensitive data you handle]
Current incident process: [what you do now — or 'we wing it']
Regulatory requirements: [breach notification laws: GDPR 72-hour rule, state laws, HIPAA, etc.]
Communication tools: [Slack, PagerDuty, phone tree, email — how the team communicates in emergencies]
Insurance: [do you have cyber insurance? What does it require?]

Build an incident response playbook:
1. **Incident classification:** severity levels (SEV1-4) with concrete examples for each level. Include the escalation criteria for each
2. **First responder checklist:** the exact steps for the first 30 minutes after detection. Who to notify, what to preserve, what NOT to do
3. **Scenario playbooks:** step-by-step response for 4 common scenarios:
   - Ransomware attack
   - Data breach / unauthorized access
   - DDoS attack
   - Compromised credentials / insider threat
4. **Communication templates:** internal notification (team/leadership), customer notification, regulatory filing, and public statement. Pre-written, fill-in-the-blanks
5. **Evidence preservation protocol:** what to capture, how to maintain chain of custody, and what NOT to modify (for forensics and legal)
6. **Post-incident review:** a structured retrospective template covering timeline reconstruction, root cause analysis, what worked, what didn't, and specific improvements
7. **Contact list template:** who to call (internal team, legal counsel, cyber insurance, forensics firm, law enforcement) with when to involve each

進階技巧

在真正事件發生前,用這本手冊和團隊做一次桌面推演。團隊第一次使用應變計畫的場合,不應該是在真正的資安事件中。演練能揭露溝通落差、職責不清和工具缺失,這些光讀文件永遠發現不了。

已測試 Mar 15, 2026

API 安全強化師

針對真實攻擊模式鎖定你的端點

Help me secure my API against common and advanced attack vectors.

API type: [REST / GraphQL / gRPC / WebSocket]
Authentication: [current auth mechanism and token lifecycle]
Authorization: [how you control who can access what]
Rate limiting: [current setup or none]
Public endpoints: [which endpoints are accessible without auth]
Sensitive operations: [endpoints that modify data, access PII, handle payments, manage permissions]
Framework: [what you're building with]
API consumers: [internal frontend / mobile app / third-party developers / all]

Provide:
1. **OWASP API Security Top 10 assessment:** for each risk category, whether your API is vulnerable and the specific fix
2. **Input validation strategy:** what to validate on each endpoint type (path params, query params, request body, headers). Include validation library recommendations for your framework
3. **Authentication hardening:** token lifecycle, refresh token rotation, session fixation prevention, credential stuffing protection
4. **Authorization deep dive:** broken object-level authorization (BOLA/IDOR) prevention, function-level access control, field-level permissions
5. **Rate limiting configuration:** different limits by endpoint sensitivity (auth endpoints stricter than read endpoints). Include specific numbers and the response to return when limited
6. **API abuse detection:** behavioral patterns that indicate malicious usage (credential stuffing, data scraping, enumeration attacks). What to log and what to alert on
7. **Security headers & response hardening:** CORS config, content-type enforcement, error message sanitization (never leak stack traces or internal details to API consumers)

進階技巧

用攻擊者使用的同樣工具來測試你的 API 安全性。實施這些建議後,用 OWASP ZAP 或 Burp Suite 測試你的端點。沒有經過測試的安全只是安全劇場。而且要特別檢查 OWASP API Security Top 10——它和網頁應用 Top 10 是不同的。

已測試 Mar 15, 2026

現代身分驗證系統設計師

打造安全且使用者友善的身分驗證系統

Help me design a modern, secure authentication system.

Application type: [consumer app / enterprise SaaS / internal tool / API platform]
User base: [tech-savvy / general public / enterprise employees / developers]
Current auth: [password only / social login / 2FA / SSO / passwordless / none yet]
Framework: [your web framework and any auth libraries]
Regulatory needs: [compliance requirements affecting auth]
User friction tolerance: [security-first / balanced / convenience-first]
Scale: [number of users and concurrent sessions]

Design:
1. **Password policy (NIST-aligned):** minimum length, no arbitrary complexity rules, check against breached password databases, rate limit attempts. Include the specific implementation for your framework
2. **Hashing strategy:** recommended algorithm (Argon2id > bcrypt > scrypt), configuration parameters (memory, iterations, parallelism), and migration path from weaker hashing
3. **Multi-factor authentication:** which MFA methods to support (TOTP, WebAuthn/passkeys, SMS as fallback), enrollment flow, and recovery when MFA device is lost
4. **Session management:** token type (JWT vs. opaque), storage, lifecycle, refresh strategy, concurrent session handling, and forced logout capability
5. **Account recovery:** password reset flow that's secure AND user-friendly. Prevent account enumeration. Include the email template and token lifecycle
6. **Brute force protection:** progressive lockout (not permanent), CAPTCHA integration point, IP-based and account-based rate limiting. Specific thresholds
7. **Passwordless path:** if appropriate for your users, a migration strategy from passwords to passkeys/WebAuthn with fallback mechanisms

進階技巧

指定你的框架和身分驗證套件。通用密碼安全建議到處都有,但知道如何在 Next.js 應用中用 NextAuth 實作 Argon2 才是省時間的關鍵。而且要遵循 NIST 800-63B 指南——他們已經淘汰了「每 90 天更換」和「必須包含特殊字元」這些惱人卻不能提升安全性的舊規定。

已測試 Mar 15, 2026

資料隱私實作指南

遵守 GDPR、CCPA 等隱私法規,不過度工程化

Help me implement data privacy best practices and comply with regulations.

Data collected: [list ALL personal data you collect — including what third-party scripts collect]
Storage locations: [where data lives: database, object storage, logs, analytics, CDN, third-party services]
Third-party data sharing: [which services receive user data and what data they get]
User geography: [where your users are located — determines which laws apply]
Current privacy measures: [what's already implemented]
Compliance target: [GDPR / CCPA / both / LGPD / PIPEDA / other]
Data processing activities: [what you do with the data: analytics, personalization, marketing, ML training]

Provide:
1. **Data inventory and classification:** categorize every data point by sensitivity level (public, internal, confidential, restricted). Flag anything you collect but don't actually need
2. **Legal basis mapping:** for each data processing activity, which legal basis applies (consent, legitimate interest, contract, legal obligation) and the documentation required
3. **Consent management:** implementation plan for cookie consent, marketing opt-in, and data processing consent. Include the UI flow and technical storage
4. **Data subject rights:** technical implementation for each right (access, deletion, portability, rectification, restriction). Include API endpoints or admin tools needed
5. **Data retention schedule:** for each data type, how long to keep it, when to anonymize vs. delete, and the automated cleanup process
6. **Privacy by design checklist:** for new features, the questions to ask before collecting any data. Integrate into your sprint planning process
7. **Vendor assessment template:** questions to ask third-party services about their data handling, DPA requirements, and sub-processor management

進階技巧

先稽核你的分析和日誌。大多數隱私違規來自你忘記自己在蒐集的資料,而非你刻意儲存的。檢查你的錯誤日誌、分析事件、第三方腳本和 CDN 日誌中隱藏的個資蒐集。最大的隱私風險通常是你不知道自己擁有的資料。

已測試 Mar 15, 2026

資安合規導航師

導航 SOC2、ISO 27001 和合規框架而不被淹沒

Help me navigate security compliance for my organization.

Company stage: [startup / growth / enterprise]
Industry: [SaaS / fintech / healthcare / e-commerce / other]
Compliance target: [SOC2 / ISO 27001 / HIPAA / PCI-DSS / multiple]
Why now: [customer requirement / investor due diligence / regulatory / proactive]
Current security posture: [describe what's in place: policies, tools, practices]
Team: [who will own compliance — dedicated security team / engineering lead / external consultant]
Timeline: [when you need to be compliant]
Budget: [approximate budget for tools and consulting]

Provide:
1. **Framework overview:** what the compliance framework actually requires, in plain English. Cut through the jargon — what do you actually need to DO?
2. **Gap assessment template:** a checklist of requirements mapped to your current state. For each: have it / partially have it / don't have it / not applicable
3. **Quick wins:** controls you probably already have but haven't documented. Help me find and document them (version control = change management, code review = peer review control, etc.)
4. **Policy templates:** the 5 most important policies to write first (Information Security, Acceptable Use, Incident Response, Access Control, Data Classification). Outline for each
5. **Tool recommendations:** specific tools for your budget and company size (vulnerability scanning, endpoint protection, log management, access reviews). Not enterprise-grade for a startup
6. **Evidence collection plan:** what auditors will ask for and how to automatically generate evidence throughout the year instead of scrambling before the audit
7. **Timeline and budget:** realistic month-by-month plan from current state to audit-ready, with estimated costs for tools, consulting, and internal time

進階技巧

先從 SOC2 Type I 開始,再做 Type II——Type I 證明你有控制措施,Type II 證明它們長期有效。而且不要一次實施所有控制措施。先把現有做法對應到框架——你可能已經在不知不覺中完成了 40-60% 的要求。

已測試 Mar 15, 2026

模型比較

基於實際測試結果 — 非假設推測。 查看測試方法

G

Gemini 2.5 Pro

最擅長事件應變手冊和合規框架導航。建立結構化、符合法規要求的文件,附有清晰的檢查清單和時間表。善於將現有做法對應到合規控制措施。在應用程式層級的程式碼安全分析方面較不詳細。

最佳事件應變
G

GPT-4.1

最擅長 API 安全強化和身分驗證系統設計。能產出可直接投入生產的安全設定和框架專屬的實作程式碼。對安全工具和平台的知識最廣。可能建議企業級解方案,即使更簡單的方案更適合你的規模。

最佳 API 安全
C

Claude Sonnet 4

最擅長安全稽核、威脅建模和隱私實作。提供最徹底的漏洞分析,具有商業脈絡的風險排序。能識別其他模型忽略的攻擊向量和資料流風險。最擅長解釋漏洞「為什麼重要」,而非僅是它的存在。

最佳威脅建模
G

Grok 3

擅長真實世界威脅感知,對實際安全風險毫不修飾地直說。提供實用、可執行的安全修復而不過度工程化。最適合快速取得你的安全態勢的誠實評估。在合規框架和詳細稽核文件方面較不系統化。

最佳快速評估

在 NailedIt 中試試

將上方的提示詞貼到 NailedIt,並排比較各模型的回應。

進階技巧

1

資安是流程,不是產品——你無法安裝安全措施後就忘記它。排定每季審查、保持相依套件更新,並假設今天的安全設定明天就會被發現有漏洞。

2

先稽核日誌,再稽核程式碼——大多數隱私違規和資料洩漏來自你忘記自己在蒐集的資料——包含完整請求主體的錯誤日誌、帶有個資的分析事件、追蹤一切的第三方腳本。

3

不需要的就不要存——你儲存的每筆資料在資安事件中都是負債。請 AI 幫你稽核哪些是真正需要的 vs. 只是「以防萬一」蒐集的。刪除不必要的資料是你能做到最便宜的安全改善。