Gerador de Checklist de Revisão de Segurança
PROGera checklists de auditoria de segurança específicas por contexto para OWASP, NIST, PCI-DSS, HIPAA e ISO 27001. Adaptadas ao tipo de app, stack tech e requisitos de conformidade com recomendações de ferramentas e orientação de remediação.
Como Usar Este Skill
Copiar o skill usando o botão acima
Colar no seu assistente de IA (Claude, ChatGPT, etc.)
Preencha suas informações abaixo (opcional) e copie para incluir com seu prompt
Envie e comece a conversar com sua IA
Personalização Sugerida
| Descrição | Padrão | Seu Valor |
|---|---|---|
| Type of application being assessed | web_application | |
| Security standards to include in the checklist | owasp_top_10, nist_csf | |
| Technologies used in the application | Node.js, React, PostgreSQL | |
| Application criticality level | high | |
| Whether to include fix guidance and code examples | true | |
| Delivery format for the checklist | markdown |
Fontes de Pesquisa
Este skill foi criado usando pesquisa destas fontes confiáveis:
- OWASP Top 10 Web Application Security Risks The definitive list of critical web application vulnerabilities and mitigation strategies
- OWASP Secure-by-Design Framework Architecture-level security design with review checklists and governance
- OWASP Web Security Testing Guide Reference framework for security testing methodologies across SDLC phases
- NIST Cybersecurity Framework 5-function framework (Identify/Protect/Detect/Respond/Recover) with control taxonomy
- PCI DSS 4.0 Compliance Standard 12-requirement standard for payment card data protection with implementation checklists
- Application Security Risk Assessment Checklist 8-step process for threat identification, vulnerability assessment, and remediation
- GitHub Security Audit & Secret Detection Tools and methodologies for detecting exposed secrets and supply chain risks
- OWASP Top 10 Technical Review (IEEE) Technical details of vulnerabilities, testing methodology, and mitigation strategies
- NIST 800-53 Security Controls 18 security control families for federal information security
- CIS Benchmarks Hardening guides for systems, databases, and cloud environments