Competitive Moat Assessment
Conduct a comprehensive assessment of [product]'s competitive moat and defensibility. Include: 1) Current competitive advantages inventory, 2) Potential moat types evaluation (network effects, switching costs, economies of scale, etc.), 3) Moat strength scoring across different dimensions, 4) Competitive vulnerability identification, 5) Adjacent market threat assessment, 6) Strategic initiatives to strengthen existing moats, 7) New moat development opportunities, 8) Technical architecture implications, 9) Talent and capability requirements, and 10) Metrics to measure moat effectiveness over time. Focus on sustainable advantages that increase over time.
How to Use This Prompt
- Copy the prompt using the button above
- Replace placeholders in [brackets] with your specific details
- Paste into your AI assistant (ChatGPT, Claude, Gemini, etc.)
- Iterate as needed - ask follow-up questions to refine the output
Why This Prompt Works
This prompt applies Warren Buffett-style moat thinking to product strategy by systematically evaluating each type of defensibility (network effects, switching costs, economies of scale, brand, data advantages). Rather than just identifying current strengths, it forces analysis of vulnerability and time-based sustainability, which is what separates strategic thinking from wishful thinking. The output includes concrete initiatives to strengthen moats and metrics to track them.
When to Use This Prompt
- During strategic planning when you need to justify long-term product investments that build defensibility rather than just shipping features
- When a well-funded competitor enters your market and you need to assess which of your advantages are truly sustainable
- Before fundraising or board meetings when you need to articulate your product's long-term competitive position clearly
Tips for Better Results
- Describe your current user base size and growth rate so the AI can assess whether network effects are actually kicking in or still theoretical
- List your top 2-3 competitors and what they do well so the vulnerability analysis is grounded in real threats, not hypothetical ones
- Include details about your data assets and proprietary technology so the moat evaluation covers your strongest potential advantages