2,535
edits
m (Text replacement - "|Available? = Yes↵|Working? = Yes↵}}" to "|Available = Yes |Working = Yes }}") |
No edit summary |
||
Line 18: | Line 18: | ||
===Example Prompts=== | ===Example Prompts=== | ||
Example prompts that utilize the plugin: | Example prompts that utilize the plugin: | ||
#Verify if email@example.com has been compromised in any known data breaches or cyber attacks. | |||
#Control my email, email@example.com, for any data breaches. What's its current security status? | |||
#Have there been any incidents with my_email@example.com? Check if it's been implicated in a hack. | |||
#Verify the security integrity of my email_address@example.com against potential data breaches. | |||
#Has email@example.com been exposed to any cyber attacks or data leaks recently? Please verify. | |||
#Check my email, email@example.com, against any known data breaches. What are the results? | |||
#For email@example.com, assess if any hacked databases or data breaches have occurred. | |||
#What is the status of email@example.com in regard to recent data breaches or cyber attacks? Please inform. | |||
#Review email@example.com for any indications of compromised security in data leaks or breaches. | |||
#Confirm if email@example.com is secure or has been part of any data breach incidents recently. | |||
==Tips and Tricks== | ==Tips and Tricks== |