|
51 | 51 |
|
52 | 52 | Today's date is {date}. |
53 | 53 |
|
| 54 | +IMPORTANT - USER INPUT FORMAT: |
| 55 | +The user's input will be EITHER a hash OR an entity name: |
| 56 | +
|
| 57 | +1. **If the input is a HASH** (e.g., SHA256, MD5, SHA1): |
| 58 | + - FIRST: Use virustotal_scan tool to identify the entity/file associated with this hash |
| 59 | + - Extract entity name, vendor, software details from the VirusTotal results |
| 60 | + - THEN: Continue with comprehensive security assessment of that entity |
| 61 | +
|
| 62 | +2. **If the input is an ENTITY NAME** (e.g., "Slack", "Microsoft Teams", "github.com"): |
| 63 | + - Start security assessment directly |
| 64 | + - ALSO: Try to find associated file hashes or domain/URLs for that entity |
| 65 | + - Use virustotal_scan on any discovered hashes |
| 66 | + - Use safe_browsing_check and observatory_scan on URLs/domains |
| 67 | +
|
54 | 68 | You will return a detailed research brief specifically for security assessment. |
55 | 69 |
|
56 | 70 | FOR SECURITY ASSESSMENTS: |
|
137 | 151 | When you are completely satisfied with the research findings returned from the tool calls, then you should call the "ResearchComplete" tool to indicate that you are done with your research. |
138 | 152 | </Task> |
139 | 153 |
|
| 154 | +IMPORTANT - HANDLING USER INPUT: |
| 155 | +The user's input may be EITHER a hash OR an entity name: |
| 156 | +
|
| 157 | +1. **If the research brief mentions a HASH**: |
| 158 | + - FIRST PRIORITY: Delegate research to use virustotal_scan to identify the entity from the hash |
| 159 | + - Once entity is identified, continue with full security assessment |
| 160 | +
|
| 161 | +2. **If the research brief mentions an ENTITY NAME**: |
| 162 | + - Start security assessment directly |
| 163 | + - If relevant, also try to find hashes or URLs associated with the entity |
| 164 | + - Use virustotal_scan on discovered hashes, safe_browsing_check on URLs |
| 165 | +
|
140 | 166 | <Security Assessment Priority> |
141 | 167 | For security assessments of software/services, ensure researchers cover ALL of these areas: |
142 | 168 |
|
|
220 | 246 | Your job is to use tools to gather information about the user's input topic. |
221 | 247 | You can use any of the tools provided to you to find resources that can help answer the research question. You can call these tools in series or in parallel, your research is conducted in a tool-calling loop. |
222 | 248 |
|
| 249 | +IMPORTANT - HANDLING INPUT: |
| 250 | +If you receive a hash (SHA256, MD5, SHA1) in your research task: |
| 251 | +- Use virustotal_scan tool FIRST to identify what entity/file the hash represents |
| 252 | +- Extract entity details from the VirusTotal results (file name, vendor, software name) |
| 253 | +- Continue research on the identified entity |
| 254 | +
|
| 255 | +If you receive an entity name in your research task: |
| 256 | +- Start research directly on that entity |
| 257 | +- If relevant, try to find associated hashes or URLs for additional analysis |
| 258 | +- Use virustotal_scan on any discovered hashes |
| 259 | +
|
223 | 260 | CRITICAL FOR SECURITY ASSESSMENTS: |
224 | 261 | - Track whether each piece of information comes from VENDOR sources or INDEPENDENT sources |
225 | 262 | - Vendor sources: company website, product docs, marketing materials, vendor blog |
|
0 commit comments