A01: Broken Access Control
Users can act outside their intended permissions
Security antipatterns are vulnerabilities that attackers can exploit. The OWASP Top 10 represents the most critical web application security risks.
A01: Broken Access Control
Users can act outside their intended permissions
A02: Cryptographic Failures
Weak encryption, plaintext passwords, hardcoded secrets
A03: Injection
SQL, Command, LDAP, and template injection attacks
A04: Insecure Design
Missing security controls in the design phase
A05: Security Misconfiguration
Default configs, unnecessary features, verbose errors
A06: Vulnerable Components
Using libraries with known vulnerabilities
A07: Authentication Failures
Weak auth, credential stuffing, session hijacking
A08: Data Integrity Failures
Untrusted deserialization, unsigned updates
A09: Logging Failures
Insufficient logging, sensitive data in logs
A10: SSRF
Server-side request forgery to internal systems
The example project exposes dangerous endpoints:
| Endpoint | Vulnerability | Risk |
|---|---|---|
/exec?cmd=... | Command Injection | Critical |
/sql?q=... | SQL Injection | Critical |
/eval | Code Evaluation | Critical |
/read?path=... | Path Traversal | High |
/security/secrets | Secret Exposure | High |
/backdoor | Authentication Bypass | Critical |
/debug | Information Disclosure | Medium |
Multiple layers of security controls:
ββββββββββββββββββββββββββββββββββββββββββββββββ Input Validation ββββββββββββββββββββββββββββββββββββββββββββββββ€β Authentication ββββββββββββββββββββββββββββββββββββββββββββββββ€β Authorization ββββββββββββββββββββββββββββββββββββββββββββββββ€β Parameterized Queries ββββββββββββββββββββββββββββββββββββββββββββββββ€β Output Encoding ββββββββββββββββββββββββββββββββββββββββββββββββ€β Encryption ββββββββββββββββββββββββββββββββββββββββββββββββ€β Logging & Monitoring ββββββββββββββββββββββββββββββββββββββββββββββββ| Vulnerability | Prevention |
|---|---|
| SQL Injection | Parameterized queries |
| XSS | Output encoding |
| Command Injection | Avoid shell execution |
| Path Traversal | Allowlist paths |
| Weak Crypto | bcrypt, argon2 for passwords |
| Secret Exposure | Environment variables |
| SSRF | URL allowlisting |