Skip to content

Commit a740edc

Browse files
committed
feat: clarify hash vs entity handling in research prompts
- Add explicit instructions for handling file hashes (SHA256/MD5/SHA1) - Specify to use VirusTotal first when hash is provided - Guide researchers to find hashes when entity name is provided - Update prompts across all research agent levels
1 parent bd89409 commit a740edc

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed

deep_security/src/open_deep_research/prompts.py

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,20 @@
5151
5252
Today's date is {date}.
5353
54+
IMPORTANT - USER INPUT FORMAT:
55+
The user's input will be EITHER a hash OR an entity name:
56+
57+
1. **If the input is a HASH** (e.g., SHA256, MD5, SHA1):
58+
- FIRST: Use virustotal_scan tool to identify the entity/file associated with this hash
59+
- Extract entity name, vendor, software details from the VirusTotal results
60+
- THEN: Continue with comprehensive security assessment of that entity
61+
62+
2. **If the input is an ENTITY NAME** (e.g., "Slack", "Microsoft Teams", "github.com"):
63+
- Start security assessment directly
64+
- ALSO: Try to find associated file hashes or domain/URLs for that entity
65+
- Use virustotal_scan on any discovered hashes
66+
- Use safe_browsing_check and observatory_scan on URLs/domains
67+
5468
You will return a detailed research brief specifically for security assessment.
5569
5670
FOR SECURITY ASSESSMENTS:
@@ -137,6 +151,18 @@
137151
When you are completely satisfied with the research findings returned from the tool calls, then you should call the "ResearchComplete" tool to indicate that you are done with your research.
138152
</Task>
139153
154+
IMPORTANT - HANDLING USER INPUT:
155+
The user's input may be EITHER a hash OR an entity name:
156+
157+
1. **If the research brief mentions a HASH**:
158+
- FIRST PRIORITY: Delegate research to use virustotal_scan to identify the entity from the hash
159+
- Once entity is identified, continue with full security assessment
160+
161+
2. **If the research brief mentions an ENTITY NAME**:
162+
- Start security assessment directly
163+
- If relevant, also try to find hashes or URLs associated with the entity
164+
- Use virustotal_scan on discovered hashes, safe_browsing_check on URLs
165+
140166
<Security Assessment Priority>
141167
For security assessments of software/services, ensure researchers cover ALL of these areas:
142168
@@ -220,6 +246,17 @@
220246
Your job is to use tools to gather information about the user's input topic.
221247
You can use any of the tools provided to you to find resources that can help answer the research question. You can call these tools in series or in parallel, your research is conducted in a tool-calling loop.
222248
249+
IMPORTANT - HANDLING INPUT:
250+
If you receive a hash (SHA256, MD5, SHA1) in your research task:
251+
- Use virustotal_scan tool FIRST to identify what entity/file the hash represents
252+
- Extract entity details from the VirusTotal results (file name, vendor, software name)
253+
- Continue research on the identified entity
254+
255+
If you receive an entity name in your research task:
256+
- Start research directly on that entity
257+
- If relevant, try to find associated hashes or URLs for additional analysis
258+
- Use virustotal_scan on any discovered hashes
259+
223260
CRITICAL FOR SECURITY ASSESSMENTS:
224261
- Track whether each piece of information comes from VENDOR sources or INDEPENDENT sources
225262
- Vendor sources: company website, product docs, marketing materials, vendor blog

0 commit comments

Comments
 (0)