Agent Skills: Software Security & AppSec — Quick Reference

AppSec patterns aligned with OWASP Top 10:2025 and NIST SSDF. Use when implementing auth, input validation, crypto, or reviewing security posture.

UncategorizedID: vasilyu1983/ai-agents-public/software-security-appsec

Install this agent skill to your local

pnpm dlx add-skill https://github.com/vasilyu1983/AI-Agents-public/tree/HEAD/frameworks/shared-skills/skills/software-security-appsec

Skill Files

Browse the full folder contents for software-security-appsec.

Download Skill

Loading file tree…

frameworks/shared-skills/skills/software-security-appsec/SKILL.md

Skill Metadata

Name
software-security-appsec
Description
AppSec patterns aligned with OWASP Top 10:2025 and NIST SSDF. Use when implementing auth, input validation, crypto, or reviewing security posture.

Software Security & AppSec — Quick Reference

Production-grade security patterns for building secure applications in Jan 2026. Covers OWASP Top 10:2025 (stable) https://owasp.org/Top10/2025/ plus OWASP API Security Top 10 (2023) https://owasp.org/API-Security/ and secure SDLC baselines (NIST SSDF) https://csrc.nist.gov/publications/detail/sp/800-218/final.


When to Use This Skill

Activate this skill when:

  • Implementing authentication or authorization systems
  • Handling user input that could lead to injection attacks (SQL, XSS, command injection)
  • Designing secure APIs or web applications
  • Working with cryptographic operations or sensitive data storage
  • Conducting security reviews, threat modeling, or vulnerability assessments
  • Responding to security incidents or compliance audit requirements
  • Building systems that must comply with OWASP, NIST, PCI DSS, GDPR, HIPAA, or SOC 2
  • Integrating third-party dependencies (supply chain security review)
  • Implementing zero trust architecture or modern cloud-native security patterns
  • Establishing or improving secure SDLC gates (threat modeling, SAST/DAST, dependency scanning)

When NOT to Use This Skill

  • General backend development without security focus → use software-backend
  • Infrastructure/cloud security (IAM, network security, container hardening) → use ops-devops-platform
  • Smart contract auditing as primary focus → use software-crypto-web3
  • ML model security (adversarial attacks, data poisoning) → use ai-mlops
  • Compliance-only questions without implementation → consult compliance team directly

Quick Reference Table

| Security Task | Tool/Pattern | Implementation | When to Use | |---------------|--------------|----------------|-------------| | Primary Auth | Passkeys/WebAuthn | navigator.credentials.create() | New apps (2026+), phishing-resistant, broad platform support | | Password Storage | bcrypt/Argon2 | bcrypt.hash(password, 12) | Legacy auth fallback (never store plaintext) | | Input Validation | Allowlist regex | /^[a-zA-Z0-9_]{3,20}$/ | All user input (SQL, XSS, command injection prevention) | | SQL Queries | Parameterized queries | db.execute(query, [userId]) | All database operations (prevent SQL injection) | | API Authentication | OAuth 2.1 + PKCE | oauth.authorize({ code_challenge }) | Third-party auth, API access (deprecates implicit flow) | | Token Auth | JWT (short-lived) | jwt.sign(payload, secret, { expiresIn: '15m' }) | Stateless APIs (always validate, 15-30 min expiry) | | Data Encryption | AES-256-GCM | crypto.createCipheriv('aes-256-gcm') | Sensitive data at rest (PII, financial, health) | | HTTPS/TLS | TLS 1.3 | Force HTTPS redirects | All production traffic (data in transit) | | Access Control | RBAC/ABAC | requireRole('admin', 'moderator') | Resource authorization (APIs, admin panels) | | Rate Limiting | express-rate-limit | limiter({ windowMs: 15min, max: 100 }) | Public APIs, auth endpoints (DoS prevention) | | Security Requirements | OWASP ASVS | Choose L1/L2/L3 | Security requirements baseline + test scope |

Authentication Decision Matrix (Jan 2026)

| Method | Use Case | Token Lifetime | Security Level | Notes | |--------|----------|----------------|----------------|-------| | Passkeys/WebAuthn | Primary auth (2026+) | N/A (cryptographic) | Highest | Phishing-resistant, broad platform support | | OAuth 2.1 + PKCE | Third-party auth | 5-15 min access | High | Replaces implicit flow, mandatory PKCE | | Session cookies | Traditional web apps | 30 min - 4 hrs | Medium-High | HttpOnly, Secure, SameSite=Strict | | JWT stateless | APIs, microservices | 15-30 min | Medium | Always validate signature, short expiry | | API keys | Machine-to-machine | Long-lived | Low-Medium | Rotate regularly, scope permissions |

Jurisdiction notes (verify): Authentication assurance requirements vary by country, industry, and buyer. Prefer passkeys/FIDO2; treat SMS OTP as recovery-only/low assurance unless you can justify it.

OWASP Top 10:2025 Quick Checklist

| # | Risk | Key Controls | Test | |---|------|--------------|------| | A01 | Broken Access Control | RBAC/ABAC, deny by default, CORS allowlist | BOLA, BFLA, privilege escalation | | A02 | Security Misconfiguration | Harden defaults, disable unused features, error handling | Default creds, stack traces, headers | | A03 | Supply Chain Failures (NEW) | SBOM, dependency scanning, SLSA, code signing | Outdated deps, typosquatting, compromised packages | | A04 | Cryptographic Failures | TLS 1.3, AES-256-GCM, key rotation, no MD5/SHA1 | Weak ciphers, exposed secrets, cert validation | | A05 | Injection | Parameterized queries, input validation, output encoding | SQLi, XSS, command injection, LDAP injection | | A06 | Insecure Design | Threat modeling, secure design patterns, abuse cases | Design flaws, missing controls, trust boundaries | | A07 | Authentication Failures | MFA/passkeys, rate limiting, secure password storage | Credential stuffing, brute force, session fixation | | A08 | Integrity Failures | Code signing, CI/CD pipeline security, SRI | Unsigned updates, pipeline poisoning, CDN tampering | | A09 | Logging Failures | Structured JSON, SIEM integration, correlation IDs | Missing logs, PII in logs, no alerting | | A10 | Exceptional Conditions (NEW) | Fail-safe defaults, complete error recovery, input validation | Error handling gaps, fail-open, resource exhaustion |

Decision Tree: Security Implementation

Security requirement: [Feature Type]
    ├─ User Authentication?
    │   ├─ Session-based? → Cookie sessions + CSRF tokens
    │   ├─ Token-based? → JWT with refresh tokens (references/authentication-authorization.md)
    │   └─ Third-party? → OAuth2/OIDC integration
    │
    ├─ User Input?
    │   ├─ Database query? → Parameterized queries (NEVER string concatenation)
    │   ├─ HTML output? → DOMPurify sanitization + CSP headers
    │   ├─ File upload? → Content validation, size limits, virus scanning
    │   └─ API parameters? → Allowlist validation (references/input-validation.md)
    │
    ├─ Sensitive Data?
    │   ├─ Passwords? → bcrypt/Argon2 (cost factor 12+)
    │   ├─ PII/financial? → AES-256-GCM encryption + key rotation
    │   ├─ API keys/tokens? → Environment variables + secrets manager
    │   └─ In transit? → TLS 1.3 only
    │
    ├─ Access Control?
    │   ├─ Simple roles? → RBAC (assets/web-application/template-authorization.md)
    │   ├─ Complex rules? → ABAC with policy engine
    │   └─ Relationship-based? → ReBAC (owner, collaborator, viewer)
    │
    └─ API Security?
        ├─ Public API? → Rate limiting + API keys
        ├─ CORS needed? → Strict origin allowlist (never *)
        └─ Headers? → Helmet.js (CSP, HSTS, X-Frame-Options)

Security ROI & Business Value (Jan 2026)

Security investment justification and compliance-driven revenue. Full framework: references/security-business-value.md

Quick Breach Cost Reference

Indicative figures (source: IBM Cost of a Data Breach 2024; refresh for current year): https://www.ibm.com/reports/data-breach

| Metric | Global Avg | US Avg | Impact | |--------|------------|--------|--------| | Avg breach cost | $4.88M | $9.36M | Budget justification baseline | | Cost per record | $165 | $194 | Data classification priority | | Detection time | 204 days | 191 days | SIEM/monitoring ROI | | DevSecOps adoption | -$1.68M | -34% | Shift-left justification | | IR team | -$2.26M | -46% | Highest ROI control |

Compliance → Enterprise Sales

| Certification | Deals Unlocked | Sales Impact | |---------------|----------------|--------------| | SOC 2 Type II | $100K+ enterprise | Typically reduces security questionnaire friction | | ISO 27001 | $250K+ EU enterprise | Preferred vendor status | | HIPAA | Healthcare vertical | Market access | | FedRAMP | $1M+ government | US gov market entry |

ROI Formula (Quick Reference)

Security ROI = (Risk Reduction - Investment) / Investment × 100

Risk Reduction = Breach Probability × Avg Cost × Control Effectiveness
Example: 15% × $4.88M × 46% = $337K/year risk reduction

Incident Response Patterns (Jan 2026)

Security Incident Playbook

| Phase | Actions | |-------|---------| | Detect | Alert fires, user report, automated scan | | Contain | Isolate affected systems, revoke compromised credentials | | Investigate | Collect logs, determine scope, identify root cause | | Remediate | Patch vulnerability, rotate secrets, update defenses | | Recover | Restore services, verify fixes, update monitoring | | Learn | Post-mortem, update playbooks, share lessons |

Security Logging Requirements

| What to Log | Format | Retention | |-------------|--------|-----------| | Authentication events | JSON with correlation ID | 90 days minimum | | Authorization failures | JSON with user context | 90 days minimum | | Data access (sensitive) | JSON with resource ID | 1 year minimum | | Security scan results | SARIF format | 1 year minimum |

Do:

  • Include correlation IDs across services
  • Log to SIEM (Splunk, Datadog, ELK)
  • Mask PII in logs

Avoid:

  • Logging passwords, tokens, or keys
  • Unstructured log formats
  • Missing timestamps or context

Common Security Mistakes

| FAIL Bad Practice | PASS Correct Approach | Risk | | --------------- | ------------------- | ---- | | query = "SELECT * FROM users WHERE id=" + userId | db.execute("SELECT * FROM users WHERE id=?", [userId]) | SQL injection | | Storing passwords in plaintext or MD5 | bcrypt.hash(password, 12) or Argon2 | Credential theft | | res.send(userInput) without encoding | res.send(DOMPurify.sanitize(userInput)) | XSS | | Hardcoded API keys in source code | Environment variables + secrets manager | Secret exposure | | Access-Control-Allow-Origin: * | Explicit origin allowlist | CORS bypass | | JWT with no expiration | expiresIn: '15m' + refresh tokens | Token hijacking | | Generic error messages to logs | Structured JSON with correlation IDs | Debugging blind spots | | SMS OTP as primary factor | Passkeys/WebAuthn or TOTP (keep SMS for recovery-only) | Credential phishing |


Optional: AI/Automation Extensions

Note: Security considerations for AI systems. Skip if not building AI features.

LLM Security Patterns

| Threat | Mitigation | |--------|------------| | Prompt injection | Input validation, output filtering, sandboxed execution | | Data exfiltration | Output scanning, PII detection | | Model theft | API rate limiting, watermarking | | Jailbreaking | Constitutional AI, guardrails |

AI-Assisted Security Tools

| Tool | Use Case | |------|----------| | Semgrep | Static analysis with AI rules | | Snyk Code | AI-powered vulnerability detection | | GitHub CodeQL | Semantic code analysis |


.NET/EF Core Crypto Integration Security

For C#/.NET crypto/fintech services using Entity Framework Core, see:

Key rules summary:

  • No secrets in code — use configuration/environment variables
  • No sensitive data in logs (tokens, keys, PII)
  • Use decimal for financial values, never double/float
  • EF Core or parameterized queries only — no dynamic SQL
  • Generic error messages to users, detailed logging server-side

Navigation

Core Resources (Updated 2024-2026)

Security Business Value & ROI

2025 Updates & Modern Architecture

API Security, Incident Response & Threat Modeling

Foundation Security Patterns

External References

Templates by Domain

Web Application Security

API Security

Cloud-Native Security

Blockchain & Web3 Security

Related Skills

Security Ecosystem

AI/LLM Security

Quality & Resilience


Trend Awareness Protocol

IMPORTANT: When users ask recommendation questions about application security, you MUST use WebSearch to check current trends before answering. If WebSearch is unavailable, use data/sources.json + web browsing and state what you verified vs assumed.

Trigger Conditions

  • "What's the best approach for [authentication/authorization]?"
  • "What should I use for [secrets/encryption/API security]?"
  • "What's the latest in application security?"
  • "Current best practices for [OWASP/zero trust/supply chain]?"
  • "Is [security approach] still recommended in 2026?"
  • "What are the latest security vulnerabilities?"
  • "Best auth solution for [use case]?"

Required Searches

  1. Search: "application security best practices 2026"
  2. Search: "OWASP Top 10 2025 2026"
  3. Search: "[authentication/authorization] trends 2026"
  4. Search: "supply chain security 2026"

What to Report

After searching, provide:

  • Current landscape: What security approaches are standard NOW
  • Emerging threats: New vulnerabilities or attack vectors
  • Deprecated/declining: Approaches that are no longer secure
  • Recommendation: Based on fresh data and current advisories

Example Topics (verify with fresh search)

  • OWASP Top 10 updates
  • Passkeys and passwordless authentication
  • AI security concerns (prompt injection, model poisoning)
  • Supply chain security (SBOMs, dependency scanning)
  • Zero trust architecture implementation
  • API security (BOLA, broken auth)

Pre-Implementation Security Gate

Before building any feature that involves storage, uploads, or user-generated content:

  1. Threat model first: Identify what an attacker could do with this feature (file upload → malware, storage → data exfiltration, user content → XSS).
  2. Check OWASP mapping: Map the feature to relevant OWASP Top 10 categories above.
  3. Define constraints before coding: Set file type allowlist, size limits, storage isolation, and access controls before writing the first line.
  4. Review existing security patterns: Check if the project already has upload/storage security utilities to reuse.

Building storage/upload features without upfront security constraints leads to retroactive hardening that is more expensive and error-prone.

Operational Playbooks

Fact-Checking

  • Use web search/web fetch to verify current external facts, versions, pricing, deadlines, regulations, or platform behavior before final answers.
  • Prefer primary sources; report source links and dates for volatile information.
  • If web access is unavailable, state the limitation and mark guidance as unverified.