Tony, CatherineCatherineTonyDíaz Ferreyra, Nicolás E.Nicolás E.Díaz FerreyraMutas, MarkusMarkusMutasDhif, SalemSalemDhifScandariato, RiccardoRiccardoScandariato2025-11-052025-11-052025-10-04ACM transactions on software engineering and methodology 34 (4): 1-53 (2025)https://hdl.handle.net/11420/58459Large Language Models (LLMs) are gaining momentum in software development with prompt-driven programming enabling developers to create code from Natural Language (NL) instructions. However, studies have questioned their ability to produce secure code and, thereby, the quality of prompt-generated software. Alongside, various prompting techniques that carefully tailor prompts have emerged to elicit optimal responses from LLMs. Still, the interplay between such prompting strategies and secure code generation remains underexplored and calls for further investigations. Objective: In this study, we investigate the impact of different prompting techniques on the security of code generated from NL instructions by LLMs. Method: First, we perform a systematic literature review to identify the existing prompting techniques that can be used for code generation tasks. A subset of these techniques are evaluated on GPT-3, GPT-3.5, and GPT-4 models for secure code generation. For this, we used an existing dataset consisting of 150 NL security-relevant code generation prompts. Results: Our work (i) classifies potential prompting techniques for code generation (ii) adapts and evaluates a subset of the identified techniques for secure code generation tasks, and (iii) observes a reduction in security weaknesses across the tested LLMs, especially after using an existing technique called Recursive Criticism and Improvement (RCI), contributing valuable insights to the ongoing discourse on LLM-generated code security.en1049-331XACM transactions on software engineering and methodology20258153Association for Computing Machinery (ACM)https://creativecommons.org/licenses/by/4.0/LLMssecure code generationprompt engineeringComputer Science, Information and General Works::004: Computer SciencesComputer Science, Information and General Works::005: Computer Programming, Programs, Data and SecurityPrompting techniques for secure code generation: a systematic investigationJournal Articlehttps://doi.org/10.15480/882.1608510.1145/372210810.15480/882.16085Journal Article