owasp-privacy-top-10

OWASP Top 10 Privacy Risks - prevention, detection, and remediation for privacy in web applications. Use when addressing app vulnerabilities, data leakage, breach response, consent, transparency, data deletion, data quality, session expiration, user access rights, excessive data collection.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "owasp-privacy-top-10" with this command: npx skills add yariv1025/skills/yariv1025-skills-owasp-privacy-top-10

OWASP Top 10 Privacy Risks

This skill encodes the OWASP Top 10 Privacy Risks for privacy-aware design and review. References are loaded per risk. Based on OWASP Top 10 Privacy Risks v2.0 2021.

When to Read Which Reference

RiskRead
P1 Web Application Vulnerabilitiesreferences/p1-web-app-vulnerabilities.md
P2 Operator-sided Data Leakagereferences/p2-operator-data-leakage.md
P3 Insufficient Data Breach Responsereferences/p3-breach-response.md
P4 Consent on Everythingreferences/p4-consent.md
P5 Non-transparent Policiesreferences/p5-non-transparent-policies.md
P6 Insufficient Deletion of User Datareferences/p6-insufficient-deletion.md
P7 Insufficient Data Qualityreferences/p7-data-quality.md
P8 Missing or Insufficient Session Expirationreferences/p8-session-expiration.md
P9 Inability to Access and Modify Datareferences/p9-user-access-modify-data.md
P10 Excessive Data Collectionreferences/p10-excessive-collection.md

Quick Patterns

  • Fix technical vulnerabilities that affect data; prevent operator leakage; have a breach response plan. Obtain valid consent; be transparent; support deletion, access, and portability; minimize collection; expire sessions.

Quick Reference / Examples

TaskApproach
Obtain valid consentExplicit opt-in, granular choices, easy withdrawal. See P4.
Support data deletionImplement "right to erasure" across all stores. See P6.
Provide data accessExport user data in portable format (JSON/CSV). See P9.
Minimize collectionCollect only what's necessary for the stated purpose. See P10.
Breach responseHave a documented plan, notify within required timeframes. See P3.

Data deletion endpoint:

@app.delete("/api/users/{user_id}/data")
def delete_user_data(user_id: str, current_user: User):
    if current_user.id != user_id:
        raise HTTPException(403)
    # Delete from all data stores
    UserDB.delete(user_id)
    AnalyticsDB.anonymize(user_id)
    SearchIndex.remove(user_id)
    BackupService.schedule_deletion(user_id)
    return {"status": "deletion_scheduled"}

Consent collection (explicit opt-in):

// Require explicit action, no pre-checked boxes
<input type="checkbox" id="marketing" />
<label for="marketing">I agree to receive marketing emails</label>
// Only enable submit when required consents are given

Data export endpoint:

@app.get("/api/users/{user_id}/export")
def export_user_data(user_id: str):
    data = collect_all_user_data(user_id)
    return Response(
        content=json.dumps(data, indent=2),
        media_type="application/json",
        headers={"Content-Disposition": f"attachment; filename={user_id}_data.json"}
    )

Workflow

Load the reference for the risk you are addressing. See OWASP Top 10 Privacy Risks for the official list.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

owasp-iot-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
General

owasp-mobile-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
General

owasp-serverless-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
General

owasp-top-10

No summary provided by upstream source.

Repository SourceNeeds Review