owasp-security

Installation
Summary

Comprehensive guide to preventing OWASP Top 10 vulnerabilities with code examples.

  • Covers all 10 categories with prevention patterns: access control, cryptography, injection, design flaws, misconfiguration, vulnerable dependencies, authentication, data integrity, logging, and SSRF
  • Includes production-ready TypeScript/Node.js code examples for each vulnerability type, from parameterized queries to secure password hashing and JWT token management
  • Provides practical implementations for rate limiting, input validation with Zod, secure headers via Helmet, and multi-factor authentication setup
  • Features a pre-deployment security checklist covering authentication, authorization, input validation, infrastructure hardening, and monitoring requirements
SKILL.md

OWASP Top 10 Security

Prevent common security vulnerabilities in web applications.

OWASP Top 10 (2021)

# Vulnerability Prevention
A01 Broken Access Control Proper authorization checks
A02 Cryptographic Failures Strong encryption, secure storage
A03 Injection Input validation, parameterized queries
A04 Insecure Design Threat modeling, secure patterns
A05 Security Misconfiguration Hardened configs, no defaults
A06 Vulnerable Components Dependency scanning, updates
A07 Auth Failures MFA, secure session management
A08 Data Integrity Failures Input validation, signed updates
A09 Logging Failures Comprehensive audit logs
A10 SSRF URL validation, allowlists
Related skills

More from hoodini/ai-agents-skills

Installs
1.7K
GitHub Stars
209
First Seen
Jan 22, 2026