2,535
edits
m (Text replacement - "|Available? = Yes↵|Working? = Yes↵}}" to "|Available = Yes |Working = Yes }}") |
No edit summary |
||
Line 18: | Line 18: | ||
===Example Prompts=== | ===Example Prompts=== | ||
Example prompts that utilize the plugin: | Example prompts that utilize the plugin: | ||
#Perform a vulnerability assessment on my website {website_url}. | |||
#Analyze possible security gaps in the web application at {website_url}. | |||
#Conduct a malware scan on the website {website_url}. | |||
#Evaluate the security of my e-commerce platform on {website_url}. | |||
#Inspect the website {website_url} for any data breach risks. | |||
#Determine if my website {website_url} is protected against common attacks. | |||
#Examine the security framework of my website at {website_url}. | |||
#Identify any weak areas in the security of the website {website_url}. | |||
#Carry out a comprehensive security analysis for {website_url}. | |||
#Examine the website {website_url} for any potential data leak vulnerabilities. | |||
==Tips and Tricks== | ==Tips and Tricks== |