Example Usage
"Check for IDOR vulnerabilities in this endpoint" "Analyze the authentication mechanism in this request" "Suggest possible SQL injection points in this request" "Generate bypass payloads for the WAF patterns in this response"