| ▲ | Thaxll 3 hours ago | |
What's the kind of prompt / flow to get Claude to work on those security tasks? | ||
| ▲ | viraptor 2 hours ago | parent [-] | |
Same as for people. You establish what the threat model is and then have multiple approaches. For example going through all interesting operations, tracking down their inputs and data flow, then looking for edge cases along the way. If you have enough time / tokens, this becomes more of a spreadsheet/checklist exercise. The more experience you have, the better you can prioritise that list towards paths that are more likely to be disrupted. | ||