AI 提示詞: 網路安全

安全漏洞不只發生在大公司——它發生在所有沒有準備的人身上。這些提示詞幫助您稽核系統、理解弱點,並建立真正保護您數據的安全實踐。已在ChatGPT、Gemini和Claude上測試,讓您知道哪個模型最重視安全。

最近測試日期 Feb 15, 2026 · 模型: GPT-4o, Gemini 2.0, Claude 3.5 Sonnet, Grok 2
您想做的事 提示詞 最適合
稽核應用程式的安全態勢 安全稽核 Claude
設計現代密碼安全系統 密碼政策 ChatGPT
識別和建模潛在威脅 威脅建模 Claude
建立安全事件應對計劃 事件應對手冊 Gemini
保護API端點 API防護盾 ChatGPT
實作資料隱私最佳實踐 隱私防護盾 Gemini

安全稽核

稽核應用程式的安全態勢

Conduct a security audit of my application.

Application type: [web app / mobile app / API / SaaS platform]
Stack: [languages, frameworks, databases, cloud provider]
Authentication: [method used: JWT, sessions, OAuth, etc.]
Sensitive data handled: [PII, payment info, health data, etc.]
Current security measures: [what you already have in place]
Compliance needs: [GDPR, HIPAA, SOC2, PCI-DSS, or none]

Audit and provide:
1. A security checklist organized by category (auth, data, network, infra)
2. Top 5 vulnerabilities to investigate immediately with severity ratings
3. OWASP Top 10 assessment: which risks apply to my stack
4. Data handling review: encryption at rest and in transit
5. Access control review: principle of least privilege analysis
6. A 30-day security improvement roadmap prioritized by risk

最適合: CLAUDE

Claude提供包含基於嚴重度優先排序的最徹底安全稽核。深入理解合規要求,將弱點與特定的法規風險關聯,而非列出通用的最佳實踐。

已測試 Feb 15, 2026

進階技巧

包含合規要求,即使目前還不合規。AI會根據需要SOC2還是一般安全審查來建構完全不同的安全路線圖。

密碼政策

設計現代密碼安全系統

Help me design a modern, user-friendly password security system.

Application type: [consumer app / enterprise / internal tool]
User base: [tech-savvy / general public / mixed]
Current auth: [password only / 2FA / SSO / OAuth]
Framework: [what you're building with]
Regulatory requirements: [any compliance needs]
User friction tolerance: [security-first / balanced / convenience-first]

Design:
1. Password policy that follows current NIST guidelines (not outdated rules)
2. Hashing strategy: algorithm, salt, pepper, and iteration recommendations
3. Multi-factor authentication implementation plan
4. Account lockout and rate limiting strategy that stops brute force without annoying users
5. Password reset flow that's secure AND user-friendly
6. A migration plan if upgrading from an insecure existing system

最適合: CHATGPT

ChatGPT提供包含框架特定範例的最可實作的認證程式碼。NIST合規的密碼政策是最新的,並解釋為什麼要求特殊字元等常見做法實際上已過時。

已測試 Feb 15, 2026

進階技巧

指定您的框架和認證函式庫。通用的密碼安全建議到處都有,但確切知道如何在Express.js應用中用Passport.js實作bcrypt才能節省時間。

威脅建模

識別和建模潛在威脅

Help me build a threat model for my application.

Application: [describe what it does and how users interact with it]
Architecture: [describe the system components and data flow]
Assets to protect: [most valuable data and functionality]
User types: [different roles and their access levels]
External integrations: [third-party services, APIs, payment processors]
Previous incidents: [any known security issues in the past]

Build a threat model:
1. Asset inventory: what's worth protecting and why
2. Trust boundary identification: where data crosses security boundaries
3. STRIDE analysis: Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege
4. Attack surface mapping: entry points an attacker could exploit
5. Risk matrix: likelihood vs. impact for each identified threat
6. Mitigation strategy for the top 5 highest-risk threats

最適合: CLAUDE

Claude進行包含完整STRIDE分析的最系統化威脅建模。不只識別技術弱點,還能識別源自商業邏輯缺陷的非顯著攻擊向量。

已測試 Feb 15, 2026

進階技巧

不只描述架構,也包含數據流的描述。威脅存在於數據在組件之間移動的地方。沒有數據流的系統圖就像沒有道路的地圖——AI無法找到危險的路徑。

事件應對手冊

建立安全事件應對計劃

Help me create a security incident response plan.

Organization size: [number of employees and IT staff]
Infrastructure: [cloud / on-premise / hybrid]
Data sensitivity: [types of sensitive data you handle]
Current incident process: [what you do now, or nothing]
Regulatory requirements: [breach notification laws that apply]
Communication channels: [how your team communicates during emergencies]

Build an incident response playbook:
1. Incident classification system: severity levels with examples
2. First responder checklist: the first 30 minutes after detection
3. Containment procedures for common scenarios (ransomware, data breach, DDoS)
4. Communication templates: internal notification, customer notification, regulatory filing
5. Evidence preservation protocol: what to save and how
6. Post-incident review template and lessons-learned process

最適合: GEMINI

Gemini能建立包含清晰逐步檢查清單的最可執行的事件應對手冊。溝通模板專業,並符合常見的法規框架。

已測試 Feb 15, 2026

進階技巧

在真正的事件之前,和團隊進行桌面演練。事件應對計劃第一次使用的場景不應該是真正的入侵。演練能揭示光讀不會發現的漏洞。

API防護盾

保護API端點

Help me secure my API against common attack vectors.

API type: [REST / GraphQL / gRPC]
Authentication: [current auth mechanism]
Rate limiting: [current setup or none]
Public endpoints: [which endpoints are publicly accessible]
Sensitive operations: [operations that modify data or access PII]
Framework: [what you're building with]

Provide:
1. Input validation strategy: what to validate and how for each endpoint
2. Authentication and authorization hardening recommendations
3. Rate limiting configuration: different limits for different endpoint types
4. CORS configuration best practices for your architecture
5. API abuse detection: patterns that indicate malicious usage
6. Security headers and response hardening checklist

最適合: CHATGPT

ChatGPT能產生可直接複製貼上的API安全設定。速率限制設定、CORS設定和中介軟體實作都是框架特定且經過生產測試的。

已測試 Feb 15, 2026

進階技巧

實作AI的建議後,用攻擊者使用的工具測試API安全。用OWASP ZAP或Burp Suite等工具執行端點。沒有測試的安全不是安全。

隱私防護盾

實作資料隱私最佳實踐

Help me implement data privacy best practices in my application.

Data collected: [list all personal data you collect]
Storage locations: [where data lives: database, file storage, logs, analytics]
Third-party sharing: [which services receive user data]
User geography: [where your users are located]
Current privacy measures: [what you've already implemented]
Compliance target: [GDPR / CCPA / both / other]

Provide:
1. Data inventory and classification: categorize all data by sensitivity level
2. Consent management implementation plan
3. Data minimization review: what data you're collecting but don't actually need
4. Right-to-deletion implementation guide (technical steps)
5. Privacy policy requirements based on your compliance targets
6. A data retention schedule: how long to keep each type of data and when to delete

最適合: GEMINI

Gemini產生包含清晰法規映射的最結構化的隱私合規框架。資料清冊和保存時程表的格式可立即用於合規文件。

已測試 Feb 15, 2026

進階技巧

先稽核分析和日誌。大多數隱私違規不是來自有意儲存的數據,而是來自忘記在收集的數據。檢查錯誤日誌、分析事件和第三方腳本的隱藏數據收集。

模型比較

基於實際測試結果 — 非假設推測。 查看測試方法

G

Gemini

Best for incident response playbooks and privacy compliance frameworks. Creates structured, regulatory-aware documentation with clear checklists. Less detailed in application-level code security analysis.

結果來源: Gemini 2.0 Flash · 已測試 Feb 15, 2026
C

ChatGPT

Best for API security and authentication implementation. Generates production-ready security code and configurations. Broad knowledge of security tools and platforms. Can suggest overly complex setups for small applications.

結果來源: GPT-4o · 已測試 Feb 15, 2026
C

Claude

Best for security audits and threat modeling. Provides the most thorough vulnerability analysis with business-context-aware risk prioritization. Identifies attack vectors other models overlook.

結果來源: Claude 3.5 Sonnet · 已測試 Feb 15, 2026
G

Grok

Excellent at real-world threat awareness and direct about actual security risks without sugarcoating. Provides practical, actionable security advice, though less systematic in compliance frameworks than GPT-4o or Claude.

結果來源: Grok 2 · 已測試 Feb 15, 2026

在 NailedIt 中試試

將上方的提示詞貼到 NailedIt,並排比較各模型的回應。

進階技巧

1

Security is a process, not a product. You can't install security and forget about it. Schedule quarterly security reviews, keep dependencies updated, and assume that today's secure configuration will have vulnerabilities discovered tomorrow.

2

The weakest link is usually human. The best firewall in the world doesn't help if an employee clicks a phishing link. Include security awareness training in your plan, not just technical controls. AI can help you build phishing simulation exercises.

3

Don't store what you don't need. Every piece of data you store is a liability. Ask AI to help you audit what you actually need vs. what you collect 'just in case.' Deleting unnecessary data is the cheapest security improvement you'll ever make.