The method
Use this prompt to identify potential security vulnerabilities in a B2B WordPress site. Tailor it by specifying plugins, themes, and critical business data handled by the site. Run this prompt periodically to maintain security. Insert the output into your security report.
The prompts
Prompt 1
I need you to perform a comprehensive security audit for a WordPress website used by [B2B Company Name]. The site is built on WordPress version [Version Number] and uses the following plugins: [List Plugins]. The theme in use is [Theme Name]. This website handles sensitive customer data, including [Types of Data]. Focus on identifying potential vulnerabilities such as SQL injection, cross-site scripting (XSS), insecure file uploads, outdated plugin versions, and weak password policies. Provide specific recommendations on how to mitigate each identified vulnerability, including code examples or configuration changes where applicable. Also, analyze the site's database security, file permissions, and user roles to ensure they adhere to security best practices. Prioritize recommendations based on the severity of the potential impact to business operations and data security. Finally, give the output as a markdown table for the best readability.
Prompt 2
Assess the current security posture of our WordPress B2B site from an external attacker's perspective. Our domain is [Domain Name], and we primarily use this site for [Main Purpose, e.g., lead generation, customer support, e-commerce]. I need you to analyze the following areas: publicly exposed files and directories, known vulnerabilities in WordPress core, plugins, and themes (using version numbers), and any security headers that are missing or misconfigured. Additionally, explore common attack vectors relevant to B2B websites, such as brute-force login attempts, contact form spam leading to phishing, and denial-of-service attacks. Provide actionable recommendations for hardening the site against these threats, including suggestions for implementing a web application firewall (WAF), enabling two-factor authentication, and monitoring the site for suspicious activity. Summarize your findings in a detailed report with severity ratings and remediation steps.