application-security

Application security covering threat modeling (STRIDE), OWASP Top 10 (2025), OWASP API Security Top 10 (2023), secure coding review, authentication/authorization patterns, input validation, encryption, security headers, supply chain security, compliance (GDPR/HIPAA/SOC2/PCI-DSS), and security monitoring. Use when reviewing code for vulnerabilities, implementing auth patterns, securing APIs, configuring security headers, hardening supply chain, preventing injection attacks, or preparing for compliance audits.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "application-security" with this command: npx skills add oakoss/agent-skills/oakoss-agent-skills-application-security

Security

Security is built-in, not bolted-on. Every feature, endpoint, and data flow must consider security implications.

OWASP Top 10 (2025)

#VulnerabilityPrevention
1Broken Access ControlVerify permissions server-side, default deny
2Security MisconfigurationSecure defaults, remove unused features
3Software Supply Chain FailuresSBOM, dependency scanning, signed builds
4Cryptographic FailuresUse TLS, hash passwords (argon2id), encrypt PII
5InjectionParameterized queries, input validation
6Insecure DesignThreat modeling, security requirements
7Authentication FailuresStrong passwords, MFA, secure session mgmt
8Software or Data IntegrityVerify dependencies, sign releases
9Logging and Alerting FailuresLog security events, set up alerts
10Mishandling Exceptional ConditionsFail securely, generic errors to clients

Security Principles

PrincipleRule
Defense in DepthMultiple layers: firewall, auth, authz, encryption, audit
Least PrivilegeMinimum permissions needed, nothing more
Zero TrustNever trust, always verify. Assume breach.
Secure by DefaultHTTPS, strict passwords, secure cookies out of the box
Fail SecurelyAccess denied on error, no internal details to users
Validate on ServerClient validation is UX, server validation is security

Pre-Deployment Checklist

AreaRequirements
PasswordsHashed with argon2id (preferred) or bcrypt (12+ rounds)
TokensJWT with EdDSA/ES256, 15min access / 7d refresh, httpOnly cookies
SessionsHttpOnly, Secure, SameSite=Strict cookies
Rate LimitingAuth endpoints: 5 attempts/15min
AuthorizationAll routes check auth server-side, default deny
InputValidated with schema (Zod), parameterized SQL
UploadsWhitelist types, enforce size limits
SecretsNo secrets in code or VCS
HeadersCSP (with nonces), HSTS, Permissions-Policy, X-Content-Type-Options
CORSConfigured restrictively
EncryptionPII encrypted at rest (AES-256) and in transit (TLS 1.3)
LoggingAudit logging for security events
DependenciesSBOM generated, npm audit clean, Dependabot enabled

Threat Modeling (STRIDE)

ThreatCategoryKey Mitigations
SpoofingAuthenticationMFA, strong passwords, JWT with short expiry
TamperingIntegrityInput validation, HTTPS/TLS, signed tokens
RepudiationAccountabilityAudit logging, digital signatures
Info DisclosureConfidentialityEncryption, least privilege, secret management
Denial of ServiceAvailabilityRate limiting, input validation, CDN/DDoS protection
Elevation of PrivilegeAuthorizationAuthz checks on every request, ABAC, permission audits

Risk Levels

LevelAction
CriticalImmediate action required
HighAddress before launch
MediumAddress post-launch
LowMonitor, may accept risk

Compliance Overview

FrameworkScopeKey Requirements
GDPREU data subjectsConsent, data subject rights, breach notification (72h), DPIA
HIPAAUS healthcare dataPHI encryption, RBAC, audit logs, BAA with providers
SOC 2SaaS customer dataSecurity policies, MFA, encryption, incident response
PCI-DSSCredit card dataUse payment processor (Stripe), tokenization, network segmentation

Anti-Patterns

Anti-PatternFix
Security as afterthoughtIntegrate from design phase
Client-side authorizationAlways verify permissions server-side
Trusting client data (e.g., userId from body)Get user ID from authenticated session
Rolling your own cryptoUse proven libraries (argon2, bcrypt, libsodium)
Compliance = securityCompliance is the minimum; security is ongoing
Verbose error responsesGeneric messages to clients, details server-side

Common Mistakes

MistakeCorrect Pattern
Performing authorization checks only on the client sideAlways verify permissions server-side; client checks are UX only
Trusting user-supplied IDs from request body (e.g., userId)Derive user identity from the authenticated session or token
Rolling custom cryptography instead of using proven librariesUse argon2id, bcrypt, or libsodium for all cryptographic operations
Treating compliance certification as equivalent to securityCompliance is the minimum bar; security requires ongoing review
Returning verbose error messages with stack traces to clientsShow generic messages to clients; log details server-side only

Delegation

  • Scan codebase for OWASP Top 10 vulnerabilities and insecure patterns: Use Explore agent to search for SQL injection, XSS, and hardcoded secrets
  • Implement authentication, authorization, and security headers end-to-end: Use Task agent to configure JWT, RBAC, CSP, HSTS, and rate limiting
  • Design a threat model and security architecture for new features: Use Plan agent to apply STRIDE methodology and map trust boundaries

For database-layer security (RLS policies, Postgres/Supabase hardening, audit trails), use the database-security skill. For AI/LLM security (prompt injection defense, agentic zero-trust, MCP tool hardening), use the secure-ai skill.

References

  • Threat Modeling — STRIDE methodology, risk assessment process, trust boundaries
  • Authentication and Authorization — JWT, session-based, OAuth, RBAC, ABAC, IDOR protection
  • API Security — OWASP API Security Top 10, object-level authorization, rate limiting, SSRF prevention, security testing
  • Input Validation — SQL injection, XSS, command injection, path traversal, Zod validation, file upload security
  • Data Protection — Password hashing (argon2id/bcrypt), AES-256-GCM encryption, secrets management
  • Secure Configuration — Security headers, CORS, Express hardening, rate limiting
  • Supply Chain Security — SBOM generation, dependency scanning, CI/CD hardening, artifact signing
  • Monitoring and Compliance — Audit logging, error handling, GDPR/HIPAA/SOC2/PCI-DSS, troubleshooting

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

database-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

quality-auditor

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

playwright

No summary provided by upstream source.

Repository SourceNeeds Review