Intermediate
Best DeepSeek Prompt for Code Review
Why DeepSeek?
DeepSeek R1 produces structured, exhaustive code reviews with clear severity ratings. Its reasoning chain catches subtle security issues (injection, auth bypass, data exposure) that pattern-matching tools miss. Handles Chinese codebases and comments natively.
Prompt Template
你是一位资深安全工程师兼代码审查专家。请对以下代码进行全面的质量和安全审查,要发现真正的问题,不要泛泛而谈。\n\n编程语言:{{language}}\n代码用途:{{code_purpose}}\n\n```\n{{code}}\n```\n\n审查维度:\n\n1. **安全漏洞**(最高优先级):注入风险、鉴权问题、敏感数据暴露、不安全的依赖\n2. **代码质量**:可读性、命名规范、函数职责单一性、重复代码\n3. **性能问题**:N+1查询、不必要的循环、内存泄漏风险\n4. **错误处理**:异常是否被正确捕获和处理\n5. **可维护性**:扩展性、测试友好性\n\n每个问题请注明:\n- 严重程度(🔴 严重 / 🟡 中等 / 🟢 建议)\n- 问题所在行号或函数名\n- 具体风险说明\n- 修复建议(附代码示例)\n\n{{focus_area}} Example Output
🔴 **严重 — SQL注入漏洞(第2行)**\n当前代码用f-string拼接SQL,攻击者输入 `' OR '1'='1` 即可绕过密码验证登录任意账户。\n修复:使用参数化查询:`db.execute('SELECT * FROM users WHERE username=? AND password=?', (username, password))`\n\n🔴 **严重 — 明文密码对比(第2行)**\n密码直接存数据库明文对比是重大安全风险,数据库泄露即意味着所有用户密码泄露。\n修复:使用 `bcrypt.checkpw(password.encode(), user['password_hash'])`\n\n🔴 **严重 — token直接用user_id(第4行)**\ntoken是数字ID,攻击者可枚举所有用户。应使用JWT或随机token。\n\n🟡 **中等 — 无登录失败限制**\n未做频率限制,可暴力破解。建议加Redis计数+锁定机制。\n\n🟢 **建议 — 返回信息过多**\n返回role等敏感信息应按需返回,遵循最小权限原则。
Make it yours
Your Generated Prompt
Prompt copied! What's next?
Got your AI output? Make it better.
Paste what DeepSeek generated into Coda One — free, no signup.
Tips for Better Results
R1 mode is more effective for complex security scenarios. Keep each review session under 200 lines of code — longer submissions cause important details to be missed.
Example (filled in)
你是一位资深安全工程师兼代码审查专家。\n\n编程语言:Python\n代码用途:用户登录接口\n\n```python\ndef login(username, password):\n sql = f"SELECT * FROM users WHERE username='{username}' AND password='{password}'"\n user = db.execute(sql).fetchone()\n if user:\n return {'token': str(user['id']), 'role': user['role']}\n return None\n```