OWASP Top 10
OWASP Top 10
HACKSPLAINING
OWASP TOP 10
TOP 10 WEB APPLICATION SECURITY RISKS
Each year OWASP (the Open Web Application Security Project) publishes the top ten
security vulnerabilities. It represents a broad consensus about the most critical
security risks to web applications. Click through on the lessons below to learn more about
how to protect against each security risk.
2. Cryptographic Failures
Many web applications and APIs do not properly protect sensitive data with strong
encryption. Attackers may steal or modify such weakly protected data to conduct
credit card fraud, identity theft, or other crimes. Sensitive data must be encryption at
rest and in transit, using a modern (and correctly configured) encryption algorithm.
We use cookies to enhance your experience. By continuing to visit this site you agree to our ✖
use of cookies. More info
https://www.hacksplaining.com/owasp 1/6
10/3/23, 12:26 PM OWASP Top 10
unencrypted communication
3. Injection
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted
data is sent to an interpreter as part of a command or query. The attacker’s hostile
data can trick the interpreter into executing unintended commands or accessing
data without proper authorization.
4. Insecure Design
Pre-coding activities are critical for the design of secure software. The design phase
of you development lifecycle should gather security requirements and model
threats, and development time should be budgeted to allow for these requirements
to be met. As software changes, your team should test assumptions and conditions
for expected and failure flows, ensuring they are still accurate and desirable. Failure
to do so will let slip critical information to attackers, and fail to anticipate novel
attack vectors.
We use cookies to enhance your experience. By continuing to visit this site you agree to our ✖
use of cookies. More info
https://www.hacksplaining.com/owasp 2/6
10/3/23, 12:26 PM OWASP Top 10
5. Security Misconfiguration
Your software is only as secure as you configure it to be. Using ad hoc configuration
standards can lead to default accounts being left in place, open cloud storage,
misconfigured HTTP headers, and verbose error messages containing sensitive
information. Not only must all operating systems, frameworks, libraries, and
applications be securely configured, but they must be patched/upgraded in a timely
fashion.
We use cookies to enhance your experience. By continuing to visit this site you agree to our ✖
use of cookies. More info
https://www.hacksplaining.com/owasp 3/6
10/3/23, 12:26 PM OWASP Top 10
toxic dependencies
https://www.hacksplaining.com/owasp 4/6
10/3/23, 12:26 PM OWASP Top 10
Software and data integrity failures relate to code and infrastructure that does not
protect against integrity violations. An example of this is where an application relies
upon plugins, libraries, or modules from untrusted sources, repositories, and
content delivery networks (CDNs). An insecure deployment pipeline can introduce
the potential for unauthorized access, malicious code, or system compromise. Lastly,
many applications now include auto-update functionality, where updates are
downloaded without sufficient integrity verification and applied to the previously
trusted application. Attackers could potentially upload their own updates to be
distributed and run on all installations.
We use cookies to enhance your experience. By continuing to visit this site you agree to our ✖
use of cookies. More info
https://www.hacksplaining.com/owasp 5/6
10/3/23, 12:26 PM OWASP Top 10
We use cookies to enhance your experience. By continuing to visit this site you agree to our ✖
use of cookies. More info
https://www.hacksplaining.com/owasp 6/6