
OWASP Top Ten Web Application Security Risks
Nov 6, 2025 · The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web …
Threat Modeling - OWASP Foundation
Applied to software, it enables informed decision-making about application security risks. In addition to producing a model, typical threat modeling efforts also produce a prioritized list of security …
OWASP SAMM | OWASP Foundation
OWASP SAMM and the SAMM v2 release is the open source software security maturity model used to develop secure software for IT, application and software security technologists.
OWASP AI Testing Guide
Nov 26, 2025 · Because of these complexities, the industry is converging on the principle that: Security is not sufficient, AI Trustworthiness is the real objective. This OWASP AI Testing Guide …
Security fundamentals - OWASP Developer Guide
The fundamental principles of application security rely on the security concepts referenced in this developer guide. This section aims to provide an introduction to fundamental principles that any …
OWASP Top 10 for Large Language Model Applications
This is the repository for the OWASP Top 10 for Large Language Model Applications. However, this project has now grown into the comprehensive OWASP GenAI Security Project - a global initiative …
OWASP Secure by Design Framework
The OWASP Secure-by-Design Framework provides practical guidance to embed security into software architecture from the start—long before code is written.
Threat Modeling Process - OWASP Foundation
This document describes a structured approach to application threat modeling that enables you to identify, quantify, and address the security risks associated with an application.
Threat Modeling - OWASP Cheat Sheet Series
Proper threat modeling requires participants to think creatively and critically about the security and threat landscape of a specific application. It challenges individuals to "think like an attacker" and apply …
LLM01:2025 Prompt Injection - OWASP Gen AI Security Project
The severity and nature of the impact of a successful prompt injection attack can vary greatly and are largely dependent on both the business context the model operates in, and the agency with which …