AI Security Hub

Comprehensive OWASP Top 10 reference covering AI, web, cloud, and DevOps security.
A practical resource for development teams.

10
OWASP Top 10 Vulnerabilities
8
OWASP Categories
80+
Security Risks

🔥 Latest Security News

Last updated:

Loading news...

View all news & trends →

📚 Contents

Click each section to view details.

🤖 AI Security

🤖

OWASP LLM Top 10

The 10 most critical security risks for LLM applications with Python code examples

🦾

OWASP Agentic Top 10

The 10 most critical security risks for AI agent systems with Python code examples

🧠

OWASP ML Top 10

The 10 most critical machine learning security risks with Python code examples

🏗 Infrastructure

🔟

OWASP API Top 10

The 10 most critical vulnerabilities with mitigation code examples

🌐

OWASP Web App Top 10

The 10 most critical web application security risks with code examples

☁️

OWASP Cloud-Native Top 10

The 10 most critical cloud-native application security risks with Kubernetes/Terraform examples

🔄

OWASP CI/CD Top 10

The 10 most critical CI/CD pipeline security risks with GitHub Actions/Jenkins examples

OWASP Kubernetes Top 10

The 10 most critical Kubernetes security risks with YAML/Terraform/Helm examples

📋 Practices & Information

🔐

Authentication & Authorization

OAuth 2.0 / JWT / API Key Management

Rate Limiting & Input Validation

Rate Limiting / Validation / CORS

🛠

Security Tools

Burp Suite / ZAP / Postman and more

📋

Internal Guidelines

Checklists / Review Criteria

📰

Latest Information

Vulnerability News / CVE / Trends

📝

Vendor Blogs

Latest from Salt Security / Wallarm / Cequence / Imperva

Quick Reference

Fundamental Security Principles

🔒 Principle of Least Privilege

Grant only the minimum permissions needed for API access. Implement Role-Based Access Control (RBAC).

🛡 Defense in Depth

Combine authentication, authorization, input validation, rate limiting, and log monitoring to eliminate single points of failure.

📝 Zero Trust

Verify every request. Do not trust access even from internal networks.

🔍 Observability

Log all API access and ensure anomaly detection and audit trails.

🚨 #1 Risk from Each Category

The highest-priority risk from each of the 8 OWASP Top 10 categories covered on this site.

🤖

LLM01 - Prompt Injection

Crafted inputs manipulate LLM behavior, bypassing instructions or extracting sensitive data via direct or indirect injection.

LLM Top 10
🦾

ASI01 - Agent Goal Hijack

Attackers manipulate an agent's objectives through crafted inputs, causing it to pursue unintended targets across multiple steps.

Agentic Top 10
🧠

ML01 - Input Manipulation Attack

Adversarial inputs cause ML models to make incorrect predictions, bypassing detection systems and content filters.

ML Top 10
🔟

API1 - Broken Object Level Authorization

Unauthorized access to other users' data by manipulating object IDs. The most frequently occurring API vulnerability.

API Top 10
🌐

A01 - Broken Access Control

Users act outside intended permissions, leading to unauthorized disclosure, modification, or destruction of data.

Web App Top 10
☁️

CNAS-1 - Insecure Configuration

Misconfigured cloud services, containers, and orchestrators are the leading cause of cloud-native breaches.

Cloud Top 10
🔄

CICD-SEC-1 - Insufficient Flow Control

Attackers push malicious code through pipelines without proper review or approval gates, bypassing branch protections.

CI/CD Top 10

K01 - Insecure Workload Configurations

Containers running as root with excessive privileges and writable filesystems create significant attack surfaces.

K8s Top 10

🚀 Getting Started

How to Use This Site

Navigate to each section using the top navigation menu. For newcomers, we recommend reading in this order: OWASP Top 10 → Authentication & Authorization → Rate Limiting.

Disclaimer

The information on this site is provided for security awareness and defensive purposes. Use for attack purposes is prohibited. The content is based on information as of 2025.