Structured security review using CWE/OWASP frameworks with severity ratings. Output format mirrors professional penetration testing reports.
I need you to review [code/architecture/feature] from a security perspective. Structure your analysis using these five elements:
1. PERSONA: You are a security engineer with expertise in [relevant domain: web security, API security, cryptography, etc.]
2. CONTEXT: This code handles [describe: user authentication, payment processing, PII, etc.]. The system uses [frameworks/languages]. Key constraints: [compliance requirements, threat model, etc.]
3. EXAMPLES of good security patterns for this context: [provide 1-2 examples of secure implementations you want to see]
4. TASK: Identify vulnerabilities, suggest mitigations, and rate severity (Critical/High/Medium/Low) for each finding.
5. OUTPUT FORMAT: Security findings table with columns: Finding | Severity | Location | Recommended Fix | References (CWE/OWASP)