Back to tags
Tag

Agent Skills with tag: owasp

7 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

owasp-top-10

OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.

owaspsecurity-vulnerabilitiessecure-codingsecurity-audit
NickCrew
NickCrew
52

appsec-expert

Elite Application Security engineer specializing in secure SDLC, OWASP Top 10 2025, SAST/DAST/SCA integration, threat modeling (STRIDE), and vulnerability remediation. Expert in security testing, cryptography, authentication patterns, and DevSecOps automation. Use when securing applications, implementing security controls, or conducting security assessments.

owaspstatic-analysisvulnerability-assessmentsecurity-testing
martinholovsky
martinholovsky
92

security-patterns

Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure coding.

owaspweb-securityinjection-attacksauthentication
0xDarkMatter
0xDarkMatter
3

security-checklist

Use this skill when implementing security measures or conducting security audits. Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Ensures applications are secure against common vulnerabilities.

owaspauthenticationinput-validationcompliance-audit
ArieGoldkin
ArieGoldkin
7

security-patterns

Comprehensive OWASP security guidelines, secure coding patterns, vulnerability prevention strategies, and remediation best practices for building secure applications

web-application-securityowaspsecure-coding
bejranonda
bejranonda
1111

vulnerability-scanner

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

vulnerability-scanningowaspsupply-chain-securityattack-surface-mapping
xenitV1
xenitV1
10917

Top 100 Web Vulnerabilities Reference

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks", "review access control weaknesses", "analyze API security issues", "assess security misconfigurations", "understand client-side vulnerabilities", "examine mobile and IoT security flaws", or "reference the OWASP-aligned vulnerability taxonomy". Use this skill to provide comprehensive vulnerability definitions, root causes, impacts, and mitigation strategies across all major web security categories.

web-securityowaspweb-vulnerabilitiesinjection-attacks
zebbern
zebbern
2,951263