Advanced AI-Assisted Coding for Developers
Thalia Barrera
AI Engineering Curriculum Manager, DataCamp



🤖 Security prompt:
You are an application security engineer.
Scan this repository for common vulnerabilities such as SQL injection, cross-site scripting, cross-site request forgery, command injection, missing authentication and authorization checks, or sensitive data exposure. Follow the CWE Top 25 Most Dangerous Software Weaknesses.
For each finding include:
- Where it occurs and why it is risky.
- A minimal proof of concept input that could trigger it.


pip-audit → dependency vulnerabilitiessemgrep → insecure code patterns🤖 Interpreting results prompt:
Here are the scan outputs. Help me interpret the results and list the vulnerabilities found, using their official names when available.
Group the findings into quick fixes, medium effort, and architectural changes. For each finding, assess the risk and include its severity.
<copy security reports here>

🤖 CI prompt:
Add the pip-audit and semgrep commands to this codebase's CI workflow to run regular security scans.
Configure the workflow to fail on high-severity findings and keep the output deterministic.



Advanced AI-Assisted Coding for Developers