Audit application source code against the OWASP Top 10 vulnerability categories. Use when the user mentions 'OWASP,' 'security audit,' 'code security review,' 'vulnerability audit,' 'find vulnerabilities,' 'secure code review,' 'security review,' or wants to check their codebase for common security weaknesses.
64
76%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Risky
Do not use without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/owasp-audit/SKILL.mdPerform a systematic security audit of application source code against the OWASP Top 10 (2021).
Work through each category systematically. For each, grep for known vulnerability patterns, then read flagged files for deeper analysis.
password, secret, api_key, private_key, MD5, SHA1, base64exec(), spawn(), system() with user inputdangerouslySetInnerHTML, v-htmlexec(, eval(, innerHTML, dangerouslySetInnerHTML, $where, raw SQL stringsAccess-Control-Allow-Origin: *)npm audit (Node), pip audit (Python), or equivalentfetch(, axios(, http.get(, urllib, requests.get( with user inputFor each finding, document:
#### [SEVERITY] A0X: [Title]
**File:** `path/to/file.ts:42`
**CWE:** CWE-XXX
**Description:** [What the vulnerability is and why it matters]
**Vulnerable Code:**
[code snippet]
**Remediation:**
[Fixed code snippet with explanation]Produce an executive summary:
# Security Audit Report
## Project: [name]
## Stack: [technologies]
## Date: [date]
### Summary
- Total findings: X
- Critical: X | High: X | Medium: X | Low: X | Info: X
### Findings
[Individual findings as above]
### Prioritized Remediation Plan
1. [Critical fixes — immediate]
2. [High fixes — this week]
3. [Medium/Low — scheduled]2400590
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.