CtrlK
BlogDocsLog inGet started
Tessl Logo

common-owasp

OWASP Top 10 audit checklist for Web Applications (2021) and APIs (2023). Use when performing any security review, PR review, or codebase audit touching web, mobile backend, or API code. (triggers: security review, OWASP, broken access control, IDOR, BOLA, injection, broken auth, API review, authorization, access control)

95

Quality

93%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

SKILL.md
Quality
Evals
Security

OWASP Top 10 Security Checklist

Priority: P0 (CRITICAL)

Always-Apply Rules

Apply these on every code write, not just during dedicated security reviews:

  • No IDOR: Filter every resource query by owner_id or tenantId alongside any user-supplied ID. findById(params.id) without an owner filter is an immediate P0.
  • No wildcard CORS: Restrict to explicit allowlisted origins — never Access-Control-Allow-Origin: * on authenticated routes.
  • No full entity return: Always project to a DTO — never serialize raw ORM output to the API response.

Context-Specific Checklist

Activate when: writing security-sensitive features, reviewing PRs, or doing codebase audits.

Mark each item: ✅ not affected | ⚠️ needs review | 🔴 confirmed finding.

P0 finding caps Security score at 40/100.

Apply framework-specific security skills alongside this checklist. See references/owasp-web.md and references/owasp-api.md for full detection signals.

OWASP Web Application Top 10 (2021)

IDRiskKey Detection Signal
A01Broken Access ControlfindById(params.id) without owner filter. Route without @authorize.
A02Cryptographic FailuresWeak hash (MD5/SHA1) for passwords. HTTP URL hardcoded. No TLS.
A03InjectionString concat in DB queries. Unsanitized input to templates. XSS.
A04Insecure DesignNo rate limiting on auth. Missing input validation at entry points.
A05Security MisconfigurationCORS *. Debug mode in prod. Missing security headers (CSP, HSTS).
A06Vulnerable ComponentsCVE in dependency audit. Unreviewed new direct dependency.
A07Auth FailuresJWT without expiry. No session invalidation on logout.
A08Data Integrity FailuresUnverified JWT/cookie. Deserialization of untrusted input.
A09Logging & MonitoringNo audit log on: deletion, password change, privilege escalation.
A10SSRFHTTP client with user-controlled URL and no allowlist.

OWASP API Security Top 10 (2023)

IDRiskKey Detection Signal
API1Broken Object Level Auth (BOLA)Resource by user-supplied ID without AND owner_id = currentUser.
API2Broken AuthenticationJWT missing exp. Token not revoked on logout. Bearer in URL.
API3Broken Property Level AuthFull ORM entity returned. No DTO projection. Mass assignment.
API4Unrestricted Resource ConsumptionNo server-enforced limit/pageSize. No throttle on heavy ops.
API5Broken Function Level AuthAdmin route reachable without role guard.
API6Unrestricted Business FlowNo verification on OTP/checkout/password-reset flows.
API8Security MisconfigurationStack trace in response. CORS * on authenticated routes.
API9Improper Inventory ManagementDeprecated/undocumented endpoints still reachable.
API10Unsafe API ConsumptionThird-party response used without schema validation.

References

Repository
HoangNguyen0403/agent-skills-standard
Last updated
Created

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.