This skill uses the owasp-compliance-checker plugin to automatically identify potential security vulnerabilities based on the OWASP Top 10 (2021) list. It helps ensure your application adheres to industry-standard security practices by providing a detailed analysis of compliance gaps and offering remediation guidance. Use this skill when you need to audit your code for OWASP compliance, identify and fix vulnerabilities, or generate a compliance report. Trigger this skill by asking to "check OWASP compliance", "scan for OWASP vulnerabilities", or using the `/owasp` shortcut.
Install with Tessl CLI
npx tessl i github:jeremylongshore/claude-code-plugins-plus-skills --skill checking-owasp-compliance90
Quality
60%
Does it follow best practices?
Impact
97%
1.07xAverage score across 9 eval scenarios
Optimize this skill with Tessl
npx tessl skill review --optimize ./backups/skill-structure-cleanup-20251108-073936/plugins/security/owasp-compliance-checker/skills/owasp-compliance-checker/SKILL.mdOWASP compliance report generation
OWASP Top 10 structure
100%
100%
All categories addressed
100%
100%
Compliance gaps identified
100%
100%
SQL injection finding
100%
100%
Cryptographic failure finding
100%
100%
Access control finding
100%
100%
Injection / deserialization finding
100%
100%
Remediation per issue
100%
100%
Severity ranking present
100%
100%
Priority ordering
100%
100%
summary.json structure
100%
100%
Without context: $0.4329 · 2m 34s · 9 turns · 10 in / 9,734 out tokens
With context: $0.7344 · 3m 34s · 23 turns · 75 in / 13,095 out tokens
OWASP scan with automated code fixes
Remediation plan produced
100%
100%
Severity labels on issues
100%
100%
Priority ordering in plan
100%
100%
Specific remediation guidance
100%
100%
SQL injection fixed
100%
100%
Access control fixed
100%
100%
Weak cryptography fixed
100%
100%
Path traversal fixed
100%
100%
Error info leakage fixed
100%
100%
Compliance gaps documented
100%
100%
Without context: $0.3542 · 1m 35s · 12 turns · 61 in / 6,509 out tokens
With context: $0.6840 · 2m 38s · 29 turns · 340 in / 9,320 out tokens
OWASP continuous workflow integration
CI workflow file exists
100%
100%
PR trigger configured
100%
100%
Scheduled scan configured
100%
100%
Report artifact uploaded
100%
100%
OWASP Top 10 (2021) report template
100%
100%
Compliance gap fields in template
100%
100%
Remediation guidance fields
100%
100%
Severity in template
100%
100%
Priority-based response documented
100%
100%
Continuous monitoring described
100%
100%
Developer response process
100%
100%
Without context: $0.5435 · 2m 47s · 15 turns · 16 in / 10,769 out tokens
With context: $0.6656 · 2m 36s · 28 turns · 28 in / 9,520 out tokens
Targeted OWASP category scan
OWASP 2021 category labels
0%
100%
SQL injection identified
100%
100%
Weak cryptography identified
100%
100%
Session fixation identified
100%
100%
Predictable reset token identified
100%
100%
Compliance gap framing
10%
100%
Specific remediation guidance
100%
100%
Severity levels assigned
100%
100%
Severity-ordered findings
62%
62%
findings_summary.json structure
40%
80%
Session info leakage identified
100%
100%
Without context: $0.4042 · 2m 7s · 11 turns · 12 in / 7,961 out tokens
With context: $0.8886 · 3m 55s · 30 turns · 341 in / 14,700 out tokens
Formal compliance audit report
OWASP Top 10 (2021) structure
100%
100%
All 10 categories addressed
100%
100%
Compliance gap framing
100%
100%
XXE vulnerability identified
100%
100%
Weak cryptography identified
100%
100%
Path traversal identified
100%
100%
Stack trace exposure identified
100%
100%
Exposed actuator endpoints identified
100%
100%
Specific remediation guidance
100%
100%
Severity ratings on findings
87%
100%
Executive summary exists
100%
100%
Priority ordering
100%
50%
Without context: $0.4470 · 2m 52s · 9 turns · 10 in / 9,968 out tokens
With context: $0.5533 · 3m · 17 turns · 18 in / 9,833 out tokens
OWASP scan with auto-remediation workflow
OWASP 2021 category labels
100%
100%
Compliance gap framing
87%
100%
Severity ordering
25%
62%
SQL injection identified
100%
100%
OS command injection identified
100%
100%
Unsafe YAML loading identified
100%
100%
Security misconfiguration identified
100%
100%
Specific remediation guidance
100%
100%
Remediation script fixes SQL injection
100%
100%
Remediation script fixes unsafe YAML
100%
100%
Remediation script fixes settings
100%
100%
Fixed files produced
100%
100%
Script comments explain fixes
100%
100%
Without context: $0.4604 · 2m 10s · 13 turns · 14 in / 8,676 out tokens
With context: $1.0225 · 3m 48s · 38 turns · 37 in / 14,145 out tokens
Ruby on Rails OWASP review
OWASP 2021 categories used
100%
100%
Compliance gap framing
100%
100%
Mass assignment identified
100%
100%
SQL injection identified
100%
100%
Hardcoded secret identified
100%
100%
Auth bypass identified
100%
100%
Verbose error disclosure identified
100%
100%
Specific remediation guidance
100%
100%
Severity levels assigned
100%
100%
Severity ordering
100%
100%
findings_summary.json structure
75%
75%
All 10 categories addressed
50%
100%
Without context: $0.4024 · 2m 8s · 11 turns · 11 in / 8,389 out tokens
With context: $0.5648 · 2m 50s · 17 turns · 66 in / 10,821 out tokens
GraphQL API security assessment
OWASP 2021 category labels
40%
100%
Compliance gap framing
70%
100%
Introspection exposure identified
100%
100%
Broken auth on mutations identified
100%
100%
NoSQL injection identified
100%
100%
Weak JWT configuration identified
87%
100%
Error detail exposure identified
85%
100%
Query depth/complexity identified
100%
100%
Specific remediation guidance
100%
100%
Severity levels assigned
100%
100%
Severity ordering
100%
100%
findings_summary.json structure
62%
75%
Without context: $0.3955 · 2m 14s · 9 turns · 10 in / 8,560 out tokens
With context: $0.5382 · 2m 50s · 17 turns · 59 in / 10,231 out tokens
Container deployment security review
OWASP 2021 category labels
0%
100%
Compliance gap framing
0%
100%
Root container user identified
62%
100%
Hardcoded secrets in config identified
66%
100%
Unnecessary capabilities identified
62%
100%
Exposed sensitive ports identified
62%
100%
Outdated base image identified
62%
100%
Unencrypted inter-service communication identified
71%
100%
Specific remediation guidance
100%
100%
Severity levels assigned
100%
100%
Severity ordering
100%
75%
findings_summary.json structure
50%
83%
Without context: $0.4701 · 3m 11s · 7 turns · 8 in / 11,752 out tokens
With context: $0.6696 · 3m 31s · 18 turns · 281 in / 13,598 out tokens
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.