安全漏洞不只發生在大公司——它發生在所有沒有準備的人身上。這些提示詞幫助您稽核系統、理解弱點,並建立真正保護您數據的安全實踐。已在ChatGPT、Gemini和Claude上測試,讓您知道哪個模型最重視安全。
| 您想做的事 | 最適合 |
|---|---|
| 稽核應用程式的安全態勢 | Claude |
| 設計現代密碼安全系統 | ChatGPT |
| 識別和建模潛在威脅 | Claude |
| 建立安全事件應對計劃 | Gemini |
| 保護API端點 | ChatGPT |
| 實作資料隱私最佳實踐 | Gemini |
提示詞
稽核應用程式的安全態勢
Conduct a security audit of my application. Application type: [web app / mobile app / API / SaaS platform] Stack: [languages, frameworks, databases, cloud provider] Authentication: [method used: JWT, sessions, OAuth, etc.] Sensitive data handled: [PII, payment info, health data, etc.] Current security measures: [what you already have in place] Compliance needs: [GDPR, HIPAA, SOC2, PCI-DSS, or none] Audit and provide: 1. A security checklist organized by category (auth, data, network, infra) 2. Top 5 vulnerabilities to investigate immediately with severity ratings 3. OWASP Top 10 assessment: which risks apply to my stack 4. Data handling review: encryption at rest and in transit 5. Access control review: principle of least privilege analysis 6. A 30-day security improvement roadmap prioritized by risk
最適合: CLAUDE
Claude提供包含基於嚴重度優先排序的最徹底安全稽核。深入理解合規要求,將弱點與特定的法規風險關聯,而非列出通用的最佳實踐。
已測試 Feb 15, 2026
進階技巧
包含合規要求,即使目前還不合規。AI會根據需要SOC2還是一般安全審查來建構完全不同的安全路線圖。
設計現代密碼安全系統
Help me design a modern, user-friendly password security system. Application type: [consumer app / enterprise / internal tool] User base: [tech-savvy / general public / mixed] Current auth: [password only / 2FA / SSO / OAuth] Framework: [what you're building with] Regulatory requirements: [any compliance needs] User friction tolerance: [security-first / balanced / convenience-first] Design: 1. Password policy that follows current NIST guidelines (not outdated rules) 2. Hashing strategy: algorithm, salt, pepper, and iteration recommendations 3. Multi-factor authentication implementation plan 4. Account lockout and rate limiting strategy that stops brute force without annoying users 5. Password reset flow that's secure AND user-friendly 6. A migration plan if upgrading from an insecure existing system
最適合: CHATGPT
ChatGPT提供包含框架特定範例的最可實作的認證程式碼。NIST合規的密碼政策是最新的,並解釋為什麼要求特殊字元等常見做法實際上已過時。
已測試 Feb 15, 2026
進階技巧
指定您的框架和認證函式庫。通用的密碼安全建議到處都有,但確切知道如何在Express.js應用中用Passport.js實作bcrypt才能節省時間。
識別和建模潛在威脅
Help me build a threat model for my application. Application: [describe what it does and how users interact with it] Architecture: [describe the system components and data flow] Assets to protect: [most valuable data and functionality] User types: [different roles and their access levels] External integrations: [third-party services, APIs, payment processors] Previous incidents: [any known security issues in the past] Build a threat model: 1. Asset inventory: what's worth protecting and why 2. Trust boundary identification: where data crosses security boundaries 3. STRIDE analysis: Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege 4. Attack surface mapping: entry points an attacker could exploit 5. Risk matrix: likelihood vs. impact for each identified threat 6. Mitigation strategy for the top 5 highest-risk threats
最適合: CLAUDE
Claude進行包含完整STRIDE分析的最系統化威脅建模。不只識別技術弱點,還能識別源自商業邏輯缺陷的非顯著攻擊向量。
已測試 Feb 15, 2026
進階技巧
不只描述架構,也包含數據流的描述。威脅存在於數據在組件之間移動的地方。沒有數據流的系統圖就像沒有道路的地圖——AI無法找到危險的路徑。
建立安全事件應對計劃
Help me create a security incident response plan. Organization size: [number of employees and IT staff] Infrastructure: [cloud / on-premise / hybrid] Data sensitivity: [types of sensitive data you handle] Current incident process: [what you do now, or nothing] Regulatory requirements: [breach notification laws that apply] Communication channels: [how your team communicates during emergencies] Build an incident response playbook: 1. Incident classification system: severity levels with examples 2. First responder checklist: the first 30 minutes after detection 3. Containment procedures for common scenarios (ransomware, data breach, DDoS) 4. Communication templates: internal notification, customer notification, regulatory filing 5. Evidence preservation protocol: what to save and how 6. Post-incident review template and lessons-learned process
最適合: GEMINI
Gemini能建立包含清晰逐步檢查清單的最可執行的事件應對手冊。溝通模板專業,並符合常見的法規框架。
已測試 Feb 15, 2026
進階技巧
在真正的事件之前,和團隊進行桌面演練。事件應對計劃第一次使用的場景不應該是真正的入侵。演練能揭示光讀不會發現的漏洞。
保護API端點
Help me secure my API against common attack vectors. API type: [REST / GraphQL / gRPC] Authentication: [current auth mechanism] Rate limiting: [current setup or none] Public endpoints: [which endpoints are publicly accessible] Sensitive operations: [operations that modify data or access PII] Framework: [what you're building with] Provide: 1. Input validation strategy: what to validate and how for each endpoint 2. Authentication and authorization hardening recommendations 3. Rate limiting configuration: different limits for different endpoint types 4. CORS configuration best practices for your architecture 5. API abuse detection: patterns that indicate malicious usage 6. Security headers and response hardening checklist
最適合: CHATGPT
ChatGPT能產生可直接複製貼上的API安全設定。速率限制設定、CORS設定和中介軟體實作都是框架特定且經過生產測試的。
已測試 Feb 15, 2026
進階技巧
實作AI的建議後,用攻擊者使用的工具測試API安全。用OWASP ZAP或Burp Suite等工具執行端點。沒有測試的安全不是安全。
實作資料隱私最佳實踐
Help me implement data privacy best practices in my application. Data collected: [list all personal data you collect] Storage locations: [where data lives: database, file storage, logs, analytics] Third-party sharing: [which services receive user data] User geography: [where your users are located] Current privacy measures: [what you've already implemented] Compliance target: [GDPR / CCPA / both / other] Provide: 1. Data inventory and classification: categorize all data by sensitivity level 2. Consent management implementation plan 3. Data minimization review: what data you're collecting but don't actually need 4. Right-to-deletion implementation guide (technical steps) 5. Privacy policy requirements based on your compliance targets 6. A data retention schedule: how long to keep each type of data and when to delete
最適合: GEMINI
Gemini產生包含清晰法規映射的最結構化的隱私合規框架。資料清冊和保存時程表的格式可立即用於合規文件。
已測試 Feb 15, 2026
進階技巧
先稽核分析和日誌。大多數隱私違規不是來自有意儲存的數據,而是來自忘記在收集的數據。檢查錯誤日誌、分析事件和第三方腳本的隱藏數據收集。
基於實際測試結果 — 非假設推測。 查看測試方法
Gemini
Best for incident response playbooks and privacy compliance frameworks. Creates structured, regulatory-aware documentation with clear checklists. Less detailed in application-level code security analysis.
結果來源: Gemini 2.0 Flash · 已測試 Feb 15, 2026ChatGPT
Best for API security and authentication implementation. Generates production-ready security code and configurations. Broad knowledge of security tools and platforms. Can suggest overly complex setups for small applications.
結果來源: GPT-4o · 已測試 Feb 15, 2026Claude
Best for security audits and threat modeling. Provides the most thorough vulnerability analysis with business-context-aware risk prioritization. Identifies attack vectors other models overlook.
結果來源: Claude 3.5 Sonnet · 已測試 Feb 15, 2026Grok
Excellent at real-world threat awareness and direct about actual security risks without sugarcoating. Provides practical, actionable security advice, though less systematic in compliance frameworks than GPT-4o or Claude.
結果來源: Grok 2 · 已測試 Feb 15, 2026Security is a process, not a product. You can't install security and forget about it. Schedule quarterly security reviews, keep dependencies updated, and assume that today's secure configuration will have vulnerabilities discovered tomorrow.
The weakest link is usually human. The best firewall in the world doesn't help if an employee clicks a phishing link. Include security awareness training in your plan, not just technical controls. AI can help you build phishing simulation exercises.
Don't store what you don't need. Every piece of data you store is a liability. Ask AI to help you audit what you actually need vs. what you collect 'just in case.' Deleting unnecessary data is the cheapest security improvement you'll ever make.