consolelog.tools logo

OWASP Top 10 Checker

Security checklist based on OWASP Top 10 vulnerabilities

Progress0%
0 of 40 completedScore: 0/100

1. Broken Access Control

Failures related to access control that allow unauthorized access to data or functionality

2. Cryptographic Failures

Failures related to cryptography that lead to exposure of sensitive data

3. Injection

User-supplied data is not validated, filtered, or sanitized

4. Insecure Design

Missing or ineffective control design

5. Security Misconfiguration

Missing security hardening or improperly configured permissions

6. Vulnerable and Outdated Components

Using components with known vulnerabilities

7. Identification and Authentication Failures

Weaknesses in authentication and session management

8. Software and Data Integrity Failures

Failures related to code and infrastructure that don't protect against integrity violations

9. Security Logging and Monitoring Failures

Insufficient logging, monitoring, and incident response

10. Server-Side Request Forgery (SSRF)

Fetching remote resources without validating user-supplied URLs

Recommendations

  • Priority: Address 17 critical security items
  • Important: Review 20 high-priority security items

Was this tool helpful?

Share Your Experience

Help others discover this tool!

Frequently Asked Questions - OWASP Top 10 Checker