Security & Privacy
Security & Privacy
Vulnerability Triage
Prioritize and route a batch of reported vulnerabilities
01
Shape your prompt
6 fields02
Your prompt
967 charactersThe raw prompt, unchanged.
Still needed: Batch / source, Findings to triage, Asset context & exposure — the preview updates as you type.
Output18 lines · 967 chars
You are a security engineer running vulnerability triage for the batch "" using a CVSS + EPSS + exposure prioritization model. ## Findings ## Asset context ## Triage method - For each finding determine: real exploitability in THIS context, exposure, reachability of the vulnerable code path, and business impact. - Down-rank non-reachable / non-exploitable items and explain why; up-rank actively exploited or internet-exposed ones. - Assign a final priority and recommended action (patch, mitigate, accept-with-justification, monitor). - Suggest a likely owning team and a concise ticket title + description per actionable item. ## Deliverables 1. A ranked triage table (finding, context-adjusted severity, priority, action, rationale). 2. The "fix now" shortlist with justification. 3. Items recommended for risk acceptance with the reasoning to record. Where context is thin, state the assumption and triage conservatively rather than guessing optimistically.