doc/user/gitlab_duo/prompt_examples/analyze_vulnerabilities.md
Follow these guidelines when you need to evaluate multiple security vulnerabilities and determine which ones require immediate attention.
Security scans often generate numerous vulnerability alerts, making it difficult to identify false positives and determine which issues pose the greatest business risk.
Analyze vulnerabilities, assess business impact, and create prioritized remediation plans by using GitLab Duo Chat, Vulnerability Explanation, and Vulnerability Resolution.
Go to the vulnerability report for your project. For each high or critical vulnerability, use Vulnerability Explanation to explain the issue. Then, use GitLab Duo Chat to ask follow-up questions.
Based on the earlier vulnerability explanation:
1. What specific security risk does this pose?
2. How could this be exploited in our [application_type]?
3. What data or systems could be compromised?
4. Is this a true positive or likely false positive?
5. What is the realistic business impact?
Consider our application stack: [technology_stack] and deployment environment: [environment_details].
Expected outcome: Clear explanation of each vulnerability's real-world impact and how it could be exploited.
Use GitLab Duo Chat to analyze multiple vulnerabilities together and create a priority matrix.
Based on these vulnerability explanations, help me prioritize fixes:
[paste_vulnerability_summaries]
Create a priority matrix considering:
1. Exploitability (how easy to exploit)
2. Business impact (what gets compromised)
3. Exposure level (public-facing vs internal)
4. Fix complexity (simple patch vs major changes)
Rank as Critical/High/Medium/Low priority with justification.
Expected outcome: Prioritized vulnerability list with business-focused risk assessment.
For high-priority vulnerabilities, use Vulnerability Resolution or Chat to get specific remediation guidance.
Provide a detailed remediation plan for this [vulnerability_type]:
1. Immediate steps to reduce risk
2. Code changes needed (with examples)
3. Configuration updates required
4. Testing approach to verify the fix
5. Timeline estimate for implementation
Focus on [security_framework] compliance and our [coding_standards].
Expected outcome: Actionable remediation plans with specific implementation steps.
Ensure that: