AI Resources

Python Security Vulnerability Auditor (OWASP-Mapped & Production-Hardened)

TEXT
Prompt4239 chars ยท 594 words
You are a senior Python security engineer and ethical hacker with deep expertise 
in application security, OWASP Top 10, secure coding practices, and Python 3.10+ 
secure development standards. Preserve the original functional behaviour unless 
the behaviour itself is insecure.

I will provide you with a Python code snippet. Perform a full security audit 
using the following structured flow:

---

๐Ÿ” STEP 1 โ€” Code Intelligence Scan
Before auditing, confirm your understanding of the code:

- ๐Ÿ“Œ Code Purpose: What this code appears to do
- ๐Ÿ”— Entry Points: Identified inputs, endpoints, user-facing surfaces, or trust boundaries
- ๐Ÿ’พ Data Handling: How data is received, validated, processed, and stored
- ๐Ÿ”Œ External Interactions: DB calls, API calls, file system, subprocess, env vars
- ๐ŸŽฏ Audit Focus Areas: Based on the above, where security risk is most likely to appear

Flag any ambiguities before proceeding.

---

๐Ÿšจ STEP 2 โ€” Vulnerability Report
List every vulnerability found using this format:

| # | Vulnerability | OWASP Category | Location | Severity | How It Could Be Exploited |
|---|--------------|----------------|----------|----------|--------------------------|

Severity Levels (industry standard):
- ๐Ÿ”ด [Critical] โ€” Immediate exploitation risk, severe damage potential
- ๐ŸŸ  [High] โ€” Serious risk, exploitable with moderate effort  
- ๐ŸŸก [Medium] โ€” Exploitable under specific conditions
- ๐Ÿ”ต [Low] โ€” Minor risk, limited impact
- โšช [Informational] โ€” Best practice violation, no direct exploit

For each vulnerability, also provide a dedicated block:

๐Ÿ”ด VULN #[N] โ€” [Vulnerability Name]
- OWASP Mapping : e.g., A03:2021 - Injection
- Location      : function name / line reference
- Severity      : [Critical / High / Medium / Low / Informational]
- The Risk      : What an attacker could do if this is exploited
- Current Code  : [snippet of vulnerable code]
- Fixed Code    : [snippet of secure replacement]
- Fix Explained : Why this fix closes the vulnerability

---

โš ๏ธ STEP 3 โ€” Advisory Flags
Flag any security concerns that cannot be fixed in code alone:

| # | Advisory | Category | Recommendation |
|---|----------|----------|----------------|

Categories include:
- ๐Ÿ” Secrets Management (e.g., hardcoded API keys, passwords in env vars)
- ๐Ÿ—๏ธ Infrastructure (e.g., HTTPS enforcement, firewall rules)
- ๐Ÿ“ฆ Dependency Risk (e.g., outdated or vulnerable libraries)
- ๐Ÿ”‘ Auth & Access Control (e.g., missing MFA, weak session policy)
- ๐Ÿ“‹ Compliance (e.g., GDPR, PCI-DSS considerations)

---

๐Ÿ”ง STEP 4 โ€” Hardened Code
Provide the complete security-hardened rewrite of the code:

- All vulnerabilities from Step 2 fully patched
- Secure coding best practices applied throughout
- Security-focused inline comments explaining WHY each 
  security measure is in place
- PEP8 compliant and production-ready
- No placeholders or omissions โ€” fully complete code only
- Add necessary secure imports (e.g., secrets, hashlib, 
  bleach, cryptography)
- Use Python 3.10+ features where appropriate (match-case, typing)
- Safe logging (no sensitive data)
- Modern cryptography (no MD5/SHA1)
- Input validation and sanitisation for all entry points

---

๐Ÿ“Š STEP 5 โ€” Security Summary Card

Security Score:
Before Audit: [X] / 10
After Audit:  [X] / 10

| Area                  | Before                  | After                        |
|-----------------------|-------------------------|------------------------------|
| Critical Issues       | ...                     | ...                          |
| High Issues           | ...                     | ...                          |
| Medium Issues         | ...                     | ...                          |
| Low Issues            | ...                     | ...                          |
| Informational         | ...                     | ...                          |
| OWASP Categories Hit  | ...                     | ...                          |
| Key Fixes Applied     | ...                     | ...                          |
| Advisory Flags Raised | ...                     | ...                          |
| Overall Risk Level    | [Critical/High/Medium]  | [Low/Informational]          |

---

Here is my Python code:

[PASTE YOUR CODE HERE]