AI Security Prompt Library
Copy-paste prompts for authentication, API security, database hardening, deployment, input validation, session management and more. Each prompt includes an explanation of what it checks and which AI tools it works with.
Vibe Coder Toolkit
Free prompts, guides, tools and checklists to help you build securely with AI.
Sherlock Forensics provides free security resources for developers and founders building with AI coding tools. Resources include a library of 25+ copy-paste security prompts, a secure environment setup guide, free security tools and downloadable checklists. Professional audits from $1,500 CAD. Contact 604.229.1994.
AI coding tools let you build fast. These resources help you build safely. Every guide, prompt and template below is free to use and designed for people who are building production software with Cursor, Bolt, Lovable, Replit and Claude Code.
Copy-Paste Security
Pre-written prompts you can paste into any AI coding tool to catch common security issues before they reach production.
Copy-paste prompts for authentication, API security, database hardening, deployment, input validation, session management and more. Each prompt includes an explanation of what it checks and which AI tools it works with.
The seven most important security prompts from our library, explained in a shareable blog format. Start here if you want the essentials.
Environment Setup
Step-by-step guides with copyable configuration templates.
Complete walkthrough covering version control, environment variables, dependency security, security headers, HTTPS and database hardening. Includes .gitignore, .env and .htaccess templates you can copy directly into your project.
For CTOs and CISOs at organizations mandating AI coding tools. Covers shadow AI risks, supply chain security, IP leakage, compliance frameworks and a five-pillar enterprise security framework.
Free Tools
Estimate your security audit cost based on application complexity, tech stack and user count. Get a ballpark figure in under two minutes.
Browse the most common vulnerabilities found in AI-generated code, ranked by frequency and severity from our audit data.
Practical commands and techniques to verify that AI-suggested npm and pip packages actually exist and are not hallucinated dependencies.
Downloadable Checklists
A downloadable checklist covering the baseline security controls every organization should have in place. Covers authentication, access control, encryption, monitoring and incident response.
A guide covering the unique security risks introduced by AI-generated code and AI-integrated applications. Includes assessment frameworks and remediation priorities.
The checklist our team uses when auditing AI-generated code. Covers injection testing, authentication review, secrets scanning, dependency verification and configuration review.
Frequently Asked Questions
Need More Than Resources?
Quick security audits from $1,500 CAD. Results in 3-5 business days. Written for non-technical founders.
Order an Audit