Security checklist based on OWASP Top 10 vulnerabilities
Failures related to access control that allow unauthorized access to data or functionality
Failures related to cryptography that lead to exposure of sensitive data
User-supplied data is not validated, filtered, or sanitized
Missing or ineffective control design
Missing security hardening or improperly configured permissions
Using components with known vulnerabilities
Weaknesses in authentication and session management
Failures related to code and infrastructure that don't protect against integrity violations
Insufficient logging, monitoring, and incident response
Fetching remote resources without validating user-supplied URLs
Help others discover this tool!