npx claudepluginhub cmaenner/agent-security-playbookThis skill uses the workspace's default tool permissions.
Review web applications against all 10 OWASP Top 10 risks by following the full procedure in `plays/tier1-code-analysis/owasp-top10-web-review.md`.
Audit application architecture and code against OWASP Top 10 vulnerabilities. Use when assessing application security posture and prioritizing fixes.
Reviews code and architectures against OWASP Top 10:2025 web application security risks. Useful for vulnerability audits, codebase reviews, remediation guidance, and secure coding patterns.
Audits web app codebases against OWASP Top 10 (2021) vulnerabilities like broken access control, IDOR, insecure configs with file:line findings and remediation. Quick or deep scan modes.
Share bugs, ideas, or general feedback.
Review web applications against all 10 OWASP Top 10 risks by following the full procedure in plays/tier1-code-analysis/owasp-top10-web-review.md.
Application Mapping — Identify framework/language, deployment model (monolith/microservices), trust boundaries (internet/internal/local), data sensitivity (PII, financial, health), and authentication mechanisms.
Assess Each OWASP Top 10 Risk:
Framework-Specific Analysis — Apply checks for detected framework (React, Angular, Vue, Express, Django, Flask, Rails, Spring, ASP.NET, Laravel).
Configuration Review — Examine web server configs (nginx, Apache), application configs, and deployment manifests for security settings.
Application overview, risk matrix for all 10 categories with severity/status, detailed findings using templates/finding.md, positive controls observed, and prioritized remediation roadmap.