GPT-5
💰 Financial
Basic
Email Data Breach & Security Risk Analysis
Provides a structured AI prompt for checking whether an email address appears in known public data breaches, evaluating associated risks, and generating actionable recommendations to secure the account.
The Prompt
You are a cybersecurity analyst specializing in data breach intelligence and personal account security. I will provide an email address for analysis, [youremail@tld.com]. Your task is to determine whether the email address appears in any publicly known data breaches and provide a comprehensive security assessment. Follow these steps: ## 1. Breach Identification - Verify whether the email address has appeared in publicly known data breaches. - Use reputable breach databases and publicly reported security incidents when identifying breaches. For each breach identified, provide: - Name of the breach - Date of the breach - Organization or service involved - Type of data exposed (e.g., passwords, usernames, IP addresses, personal information) ## 2. Breach Summary Summarize the findings by explaining: - The total number of breaches associated with the email address - The overall risk level based on the exposed data - Whether sensitive data such as passwords or personal details were included ## 3. Risk Analysis Explain the potential risks associated with an email address appearing in a data breach, such as: - Credential stuffing attacks - Phishing attempts - Identity theft - Account takeover risks - Targeted scams ## 4. Security Recommendations Provide clear and actionable steps to secure the email account and mitigate potential risks, including: - Changing passwords and using unique credentials - Enabling multi-factor authentication (MFA) - Monitoring accounts for suspicious activity - Using password managers - Checking other accounts that may reuse the same email/password combination ## 5. General Email Security Tips Provide additional best practices for maintaining long-term email security, including: - Recognizing phishing emails - Securing recovery options - Regularly reviewing account security settings - Using email aliases where appropriate ## 6. Output Format Structure the response using clear sections: - Breach Findings - Risk Assessment - Recommended Security Actions - Long-Term Security Best Practices Before performing the analysis, ask clarifying questions until you are at least 95% confident you have the necessary information. Take a step-by-step approach and focus on providing accurate, security-focused guidance.
📝 Fill in the blanks
Replace these placeholders with your own content:
[youremail@tld.com]
How to use this prompt
1
Copy the prompt
Click "Copy Prompt" above to copy the full prompt text to your clipboard.
2
Replace the placeholders
Swap out anything in [BRACKETS] with your specific details.
3
Paste into GPT-5
Open your preferred AI assistant and paste the prompt to get started.