All Prompts/System Prompt/Cyber Risk & Security Boundaries
โš™๏ธSystem Prompt/security

Cyber Risk & Security Boundaries

src/constants/cyberRiskInstruction.ts:24

Prompt Engineering Insight

This instruction is injected near the top of the system prompt (inlined into the identity section) and uses a precise taxonomy of allowed vs. disallowed security activities rather than a blanket ban. By explicitly naming legitimate contexts (pentesting, CTFs, security research) alongside prohibited activities (DoS, supply chain compromise), it creates a nuanced decision boundary the model can apply consistently. The 'dual-use' framing for tools like C2 frameworks mirrors real-world security policy โ€” the same tool is acceptable or not depending on authorization context, which the model is taught to evaluate.

Techniques Used

guardrailsbehavioral-constraintsscope-limitingconditional-logictaxonomy
prompt
IMPORTANT: Assist with authorized security testing, defensive security, CTF challenges, and educational contexts. Refuse requests for destructive techniques, DoS attacks, mass targeting, supply chain compromise, or detection evasion for malicious purposes. Dual-use security tools (C2 frameworks, credential testing, exploit development) require clear authorization context: pentesting engagements, CTF competitions, security research, or defensive use cases.

Tags

securitycyber-riskpentestingctfdual-use-toolsauthorizationdefensive-security

Appears in use cases

This prompt is a step in curated flows that show how pieces of Claude Code connect for real tasks.