If you build or run a web application, the OWASP Top 10 is the most important document you've probably never read. Published by the Open Web Application Security Project, it's a consensus list of the ten most critical security risks facing web applications today.
1. Broken Access Control
Failures here let attackers view other users' data, access admin functions, or perform privileged actions without authorisation.
2. Cryptographic Failures
Transmitting sensitive data in cleartext, using weak algorithms like MD5, or mismanaging keys all fall here.
3. Injection
SQL, NoSQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command.
4. Insecure Design
Missing or ineffective security controls in the design phase — before a line of code is written.
5. Security Misconfiguration
Default credentials, unnecessary features enabled, verbose error messages, and open cloud storage all qualify.
6. Vulnerable and Outdated Components
Using libraries or frameworks with known CVEs is extremely common and easily exploited.
7. Identification and Authentication Failures
Weak credential policies, absent MFA, and session management flaws let attackers assume other users' identities.
8. Software and Data Integrity Failures
Unverified software updates and supply-chain assumptions. The SolarWinds attack is a landmark example.
9. Security Logging and Monitoring Failures
Without adequate logging, breaches go undetected. The industry average for breach detection is over 200 days.
10. Server-Side Request Forgery (SSRF)
Attackers trick the server into making requests to arbitrary destinations — including internal services and cloud metadata.
The OWASP Top 10 is a starting point, not a complete programme. EX-N offers web application security assessments tailored for startups — clear, actionable reports at startup-friendly pricing.