owasp-top-10

OWASP Top 10 web application security risks - prevention, detection, and remediation. Use when implementing or reviewing access control, authentication, crypto/sensitive data, input validation and injection, secure design, security configuration, dependency management, session/identity, deserialization or CI/CD integrity, logging and monitoring, or server-side requests (SSRF).

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "owasp-top-10" with this command: npx skills add yariv1025/skills/yariv1025-skills-owasp-top-10

OWASP Web Application Top 10

This skill encodes the OWASP Top 10 web application security risks for secure design, code review, and vulnerability prevention. References are loaded per risk (progressive disclosure).

Based on OWASP Top 10:2021 with 2025 RC callouts where applicable.

When to Read Which Reference

RiskRead
A01 Broken Access Controlreferences/a01-broken-access-control.md
A02 Cryptographic Failuresreferences/a02-cryptographic-failures.md
A03 Injectionreferences/a03-injection.md
A04 Insecure Designreferences/a04-insecure-design.md
A05 Security Misconfigurationreferences/a05-security-misconfiguration.md
A06 Vulnerable and Outdated Componentsreferences/a06-vulnerable-components.md
A07 Identification and Authentication Failuresreferences/a07-authentication-failures.md
A08 Software and Data Integrity Failuresreferences/a08-integrity-failures.md
A09 Security Logging and Monitoring Failuresreferences/a09-logging-monitoring-failures.md
A10 Server-Side Request Forgery (SSRF)references/a10-ssrf.md

Supply chain / dependencies → A06 (2025 A03 Software Supply Chain expands this).

Quick Patterns

  • Validate and sanitize at boundaries; use parameterized queries and allowlists.
  • Apply least privilege and deny-by-default for access control.
  • Use safe defaults in configuration; disable unnecessary features and change default credentials.
  • Track and update dependencies; verify integrity of artifacts and pipelines.

Quick Reference / Examples

TaskApproach
Prevent SQL injectionUse parameterized queries; never concatenate user input. See A03.
Enforce access controlCheck "can this user access this resource?" server-side before returning data. See A01.
Protect sensitive dataUse strong encryption (AES-256, RSA-2048+), secure key storage, TLS everywhere. See A02.
Harden configurationDisable defaults, set security headers (CSP, HSTS), use generic error pages. See A05.
Manage dependenciesTrack versions, run npm audit / pip audit, update promptly. See A06.

Safe - parameterized query:

cursor.execute("SELECT * FROM users WHERE id = ?", (user_id,))

Unsafe - SQL injection risk:

cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")  # NEVER do this

Safe - authorization check:

def get_document(doc_id, current_user):
    doc = Document.query.get(doc_id)
    if doc.owner_id != current_user.id:
        raise PermissionError("Access denied")
    return doc

Workflow

  1. Reviewing access control → Read references/a01-broken-access-control.md.
  2. Adding or changing authentication → Read references/a07-authentication-failures.md.
  3. Handling user input or queries → Read references/a03-injection.md.
  4. Designing a new feature → Read references/a04-insecure-design.md, then the relevant A0x for the feature.
  5. Aligning with OWASP 2025 → See notes in A01 (SSRF), A06 (supply chain), and A10 (exceptional conditions below).

2025 A10 – Mishandling of Exceptional Conditions: Handle exceptions and errors safely; avoid leaking sensitive information in stack traces or messages; fail secure. See OWASP Top 10:2025 for the full category.

Load reference files only when relevant to the task.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

owasp-api-security-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

agent-dev-guardrails

No summary provided by upstream source.

Repository SourceNeeds Review
General

owasp-iot-top-10

No summary provided by upstream source.

Repository SourceNeeds Review
General

owasp-mobile-top-10

No summary provided by upstream source.

Repository SourceNeeds Review