
Reverse-Engineer a Proprietary Hardware Protocol with AI
Use an advanced AI model to analyze raw packet sniffer logs and research notes to deduce an unknown, proprietary Bluetooth protocol and create a tool to interact with the hardware.
Use an advanced AI model like GPT-5.5 Pro in Codex to automatically analyze a CSV list of security vulnerabilities, group them thematically, propose architectural changes, and implement the necessary code fixes.

Download or export the list of security issues identified by your security scanning tool (e.g., OpenAI's Codex Security product) into a CSV file.
Upload the CSV file containing the list of vulnerabilities directly into the OpenAI Codex interface.
Provide a direct, high-level command instructing the AI to analyze the issues, group them, propose changes, and then implement those changes in the code.
Can you please architecturally review these issues, group them if they're thematic, and then propose a change, and then make those changes.The AI will analyze the list and implement the code fixes. Review the architectural changes and code that the model produces.

Use an advanced AI model to analyze raw packet sniffer logs and research notes to deduce an unknown, proprietary Bluetooth protocol and create a tool to interact with the hardware.

Delegate a complex, multi-format data migration to an AI agent. The model will build the migration script, create a scalable testing system to validate its own work, and repair issues in a self-sustaining loop.

Use GPT Images 2.0's advanced text and layout capabilities, combined with your own reference images, to create a polished, multi-page brand kit as a starting point for your design work.
Join 100,000+ product managers who use ChatPRD to write better docs, align teams faster, and build products users love.