Design Secure C2 Protocol

planningChallengeDecember 5, 2025

Prompt Content

Outline a secure Command & Control (C2) communication protocol for autonomous drones. Specify the cryptographic primitives for authentication, integrity, and confidentiality, and describe how key management will be handled. Consider resilience against replay attacks and spoofing.

Run with your own API keysBYOK

Use your Anthropic, OpenAI, or Vertex keys to execute this prompt directly in Vera. keys are stored locally in your browser.

Usage Tips

Copy the prompt and paste it into your preferred AI tool (Claude, ChatGPT, Gemini)

Customize placeholder values with your specific requirements and context

For best results, provide clear examples and test different variations