// owasp_hub / cheat_sheet_hub

Cheat Sheet Hub

118+ OWASP Cheat Sheets with inline markdown rendering and raw copy.

SEARCH
//
CATEGORY
TOPIC
SORT
// showing 118 of 118 cheat sheets

Abuse Case

Modeling abuse cases to proactively identify how attackers might misuse application features.

[ github ]

Access Control

Auth & Identity

Designing access control systems: role-based access, object-level authorization, and deny-by-default.

Access Control
[ github ]

AI Agent Security

Security guidelines and best practices covering a i agent security.

[ github ]

AJAX Security

Security guidelines and best practices covering a j a x security.

[ github ]

Attack Surface Analysis

Identifying and reducing your attack surface through component inventory and exposure analysis.

[ github ]

Authentication

Auth & Identity

Best practices for secure authentication: password policies, MFA, account lockout, and credential storage.

Authentication
[ github ]

Authorization

Auth & Identity

Implementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.

Authorization
[ github ]

Authorization Testing Automation

Auth & Identity

Implementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.

Authorization
[ github ]

Automotive Security

Security guidelines and best practices covering automotive security.

[ github ]

Bean Validation

Security guidelines and best practices covering bean validation.

[ github ]

Bot Management and Anti-Automation

Security guidelines and best practices covering bot management and anti- automation.

[ github ]

Browser Extension Vulnerabilities

Security guidelines and best practices covering browser extension vulnerabilities.

[ github ]

Business Logic Security

Security guidelines and best practices covering business logic security.

[ github ]

C-Based Toolchain Hardening

Security guidelines and best practices covering c- based toolchain hardening.

[ github ]

Choosing and Using Security Questions

Security guidelines and best practices covering choosing and using security questions.

[ github ]

CI CD Security

Security guidelines and best practices covering c i c d security.

[ github ]

Clickjacking Defense

Injection & Input

Protecting against clickjacking using X-Frame-Options, CSP frame-ancestors, and framebusting.

Clickjacking
[ github ]

Content Security Policy

API & Web

Building a robust CSP to prevent XSS and data injection by controlling resource loading.

Content Security
[ github ]

Cookie Theft Mitigation

Auth & Identity

Security guidelines and best practices covering cookie theft mitigation.

Cookie
[ github ]

Credential Stuffing Prevention

Security guidelines and best practices covering credential stuffing prevention.

[ github ]

Cross Site Scripting Prevention

Security guidelines and best practices covering cross site scripting prevention.

[ github ]

Cross-Site Request Forgery Prevention

Security guidelines and best practices covering cross- site request forgery prevention.

[ github ]

Cryptographic Storage

Encrypting sensitive data at rest: algorithm selection, key management, and common pitfalls.

[ github ]

Database Security

Cryptography

Database hardening: least-privilege accounts, encrypted connections, and query parameterization.

Database
[ github ]

Denial of Service

Security guidelines and best practices covering denial of service.

[ github ]

Dependency Graph SBOM

Security guidelines and best practices covering dependency graph s b o m.

[ github ]

Deserialization

Cryptography

Mitigating insecure deserialization: integrity checks, type whitelisting, and safe library usage.

Deserialization
[ github ]

Django REST Framework

API & Web

Django security checklist: DEBUG mode, CSRF middleware, secure cookies, and allowed hosts.

REST
[ github ]

Django Security

Django security checklist: DEBUG mode, CSRF middleware, secure cookies, and allowed hosts.

[ github ]

Docker Security

Infrastructure

Hardening Docker containers: least-privilege users, read-only filesystems, network isolation, and image scanning.

Docker
[ github ]

DOM based XSS Prevention

Injection & Input

Defending against Cross-Site Scripting with output encoding, Content Security Policy, and input sanitization.

XSS
[ github ]

DOM Clobbering Prevention

Security guidelines and best practices covering d o m clobbering prevention.

[ github ]

DotNet Security

Languages

.NET and ASP.NET security: ViewState protection, request validation, and identity management.

DotNet
[ github ]

Drone Security

Security guidelines and best practices covering drone security.

[ github ]

Email Validation and Verification

Security guidelines and best practices covering email validation and verification.

[ github ]

Error Handling

Logging & Errors

Secure error handling to prevent stack trace exposure and information leakage to attackers.

Error Handling
[ github ]

File Upload

Logging & Errors

Securing file uploads: type and size validation, storage isolation, and preventing malware execution.

File Upload
[ github ]

Forgot Password

Auth & Identity

Secure password reset flows: token expiry, single-use links, and account enumeration prevention.

Password
[ github ]

GitHub Actions Security

Security guidelines and best practices covering git hub actions security.

[ github ]

GraphQL

API & Web

GraphQL security: depth and complexity limits, introspection controls, auth enforcement, and injection prevention.

GraphQL
[ github ]

gRPC Security

Security guidelines and best practices covering g r p c security.

[ github ]

HTML5 Security

Security guidelines and best practices covering h t m l5 security.

[ github ]

HTTP Headers

API & Web

Security guidelines and best practices covering h t t p headers.

HTTP
[ github ]

HTTP Strict Transport Security

API & Web

Enforcing HTTPS-only communication with HSTS preloading and max-age configuration.

HTTP
[ github ]

Infrastructure as Code Security

Infrastructure

Security for IaC: secrets scanning, policy-as-code, and drift detection in Terraform and Ansible.

Infrastructure
[ github ]

Injection Prevention

Injection & Input

Preventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.

Injection
[ github ]

Injection Prevention in Java

Injection & Input

Preventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.

InjectionJava
[ github ]

Input Validation

Injection & Input

Validating and sanitizing all user input to prevent injection attacks and maintain data integrity.

Input Validation
[ github ]

Insecure Direct Object Reference Prevention

Preventing IDOR vulnerabilities with proper authorization checks on every object access.

[ github ]

JAAS

Security guidelines and best practices covering j a a s.

[ github ]

Java Security

Languages

Java security fundamentals: serialization risks, secure random, and cryptographic API usage.

Java
[ github ]

JSON Web Token for Java

Languages

Java security fundamentals: serialization risks, secure random, and cryptographic API usage.

Java
[ github ]

Key Management

Cryptographic key lifecycle management: generation, rotation, storage, and revocation.

[ github ]

Kubernetes Security

Infrastructure

Securing Kubernetes clusters: RBAC, network policies, pod security standards, and secrets management.

Kubernetes
[ github ]

Laravel

Security guidelines and best practices covering laravel.

[ github ]

LDAP Injection Prevention

Injection & Input

Preventing LDAP injection through input encoding and parameterized LDAP queries.

InjectionLDAP
[ github ]

Legacy Application Management

Security guidelines and best practices covering legacy application management.

[ github ]

LLM Prompt Injection Prevention

Injection & Input

Preventing injection flaws across SQL, OS command, LDAP, and other interpreter contexts.

Injection
[ github ]

Logging

Logging & Errors

What to log, how to protect log integrity, centralized logging patterns, and avoiding sensitive data leakage.

Logging
[ github ]

Logging Vocabulary

Logging & Errors

What to log, how to protect log integrity, centralized logging patterns, and avoiding sensitive data leakage.

Logging
[ github ]

Mass Assignment

Protecting against mass assignment by explicitly allowing only expected fields in model binding.

[ github ]

MCP Security

Security guidelines and best practices covering m c p security.

[ github ]

Microservices based Security Arch Doc

Security guidelines and best practices covering microservices based security arch doc.

[ github ]

Microservices Security

Securing microservice architectures: service-to-service auth, API gateways, and zero-trust networking.

[ github ]

Mobile Application Security

Mobile

Cross-platform mobile security covering data storage, authentication, and network communication.

Mobile
[ github ]

Multi Tenant Security

Security guidelines and best practices covering multi tenant security.

[ github ]

Multifactor Authentication

Auth & Identity

Implementing MFA: TOTP, hardware keys, push notifications, and recovery code strategies.

Authentication
[ github ]

Network Segmentation

Security guidelines and best practices covering network segmentation.

[ github ]

NodeJS Docker

Infrastructure

Security guidelines and best practices covering node j s docker.

DockerNode
[ github ]

Nodejs Security

Languages

Security guidelines and best practices covering nodejs security.

Node
[ github ]

NoSQL Security

Security guidelines and best practices covering no s q l security.

[ github ]

NPM Security

Security guidelines and best practices covering n p m security.

[ github ]

OAuth2

Auth & Identity

Implementing OAuth 2.0 safely: grant types, PKCE, token storage, and preventing common attack vectors.

OAuth
[ github ]

OS Command Injection Defense

Injection & Input

Security guidelines and best practices covering o s command injection defense.

Injection
[ github ]

Password Storage

Auth & Identity

Secure password hashing with bcrypt, Argon2, and scrypt including salting and migration strategies.

Password
[ github ]

PHP Configuration

Languages

Hardening PHP applications through secure php.ini settings and safe coding patterns.

PHP
[ github ]

Pinning

Certificate and public key pinning to prevent man-in-the-middle attacks in mobile and thick clients.

[ github ]

Prototype Pollution Prevention

Preventing prototype pollution in JavaScript by avoiding recursive merge on untrusted input.

[ github ]

Query Parameterization

Security guidelines and best practices covering query parameterization.

[ github ]

RAG Security

Security guidelines and best practices covering r a g security.

[ github ]

REST Assessment

API & Web

Security guidelines and best practices covering r e s t assessment.

REST
[ github ]

REST Security

API & Web

Security for RESTful APIs: authentication, input validation, rate limiting, and error handling.

REST
[ github ]

Ruby on Rails

Languages

Securing Rails apps: mass-assignment protection, SQL injection prevention, and XSS mitigations.

Ruby
[ github ]

SAML Security

Security guidelines and best practices covering s a m l security.

[ github ]

Secrets Management

Infrastructure

Storing, rotating, and auditing secrets: vault solutions, environment variables, and avoiding hard-coding.

Secrets
[ github ]

Secure AI Model Ops

Security guidelines and best practices covering secure a i model ops.

[ github ]

Secure Cloud Architecture

Infrastructure

Securing cloud workloads: IAM least-privilege, encryption at rest and in transit, and audit logging.

Cloud
[ github ]

Secure Code Review

Security guidelines and best practices covering secure code review.

[ github ]

Secure Coding with AI

Security guidelines and best practices covering secure coding with a i.

[ github ]

Secure Product Design

Security guidelines and best practices covering secure product design.

[ github ]

Securing Cascading Style Sheets

Security guidelines and best practices covering securing cascading style sheets.

[ github ]

Security Terminology

Security guidelines and best practices covering security terminology.

[ github ]

Server Side Request Forgery Prevention

Security guidelines and best practices covering server side request forgery prevention.

[ github ]

Serverless FaaS Security

Security guidelines and best practices covering serverless faa s security.

[ github ]

Session Management

Auth & Identity

Secure session lifecycle: token generation, expiry, invalidation, and safe cookie attributes.

Session
[ github ]

Software Supply Chain Security

Security guidelines and best practices covering software supply chain security.

[ github ]

SQL Injection Prevention

Injection & Input

Preventing SQL injection using parameterized queries, stored procedures, and allow-list input validation.

SQL InjectionInjection
[ github ]

Subdomain Takeover Prevention

Security guidelines and best practices covering subdomain takeover prevention.

[ github ]

Symfony

Security guidelines and best practices covering symfony.

[ github ]

Third Party Javascript Management

Languages

Managing third-party scripts securely: SRI, CSP restrictions, and vendor risk evaluation.

Java
[ github ]

Third Party Payment Gateway Integration

Security guidelines and best practices covering third party payment gateway integration.

[ github ]

Threat Modeling

Structured threat analysis using STRIDE, attack trees, and data flow diagrams before writing code.

[ github ]

TLS Cipher String

Infrastructure

Selecting secure TLS cipher suites to balance compatibility and cryptographic strength.

TLS
[ github ]

Transaction Authorization

Auth & Identity

Implementing robust authorization controls: RBAC, ABAC, privilege separation, and least-privilege principles.

Authorization
[ github ]

Transport Layer Protection

Security guidelines and best practices covering transport layer protection.

[ github ]

Transport Layer Security

Configuring TLS: cipher suites, certificate validation, HSTS, and avoiding common misconfigurations.

[ github ]

Unvalidated Redirects and Forwards

Preventing open redirect attacks by validating and whitelisting redirect targets.

[ github ]

User Privacy Protection

Implementing privacy by design: data minimization, consent, and user data deletion rights.

[ github ]

Virtual Patching

Using WAF rules and middleware to temporarily mitigate vulnerabilities before a code fix ships.

[ github ]

Vulnerability Disclosure

Establishing a responsible vulnerability disclosure policy and coordinated response process.

[ github ]

Vulnerable Dependency Management

Security guidelines and best practices covering vulnerable dependency management.

[ github ]

Web Service Security

Securing web services: SOAP/REST authentication, message integrity, and service hardening.

[ github ]

WebSocket Security

Security guidelines and best practices covering web socket security.

[ github ]

XML External Entity Prevention

Injection & Input

Defending against XXE attacks by disabling external entity processing in XML parsers.

XML
[ github ]

XML Security

Injection & Input

Security guidelines and best practices covering x m l security.

XML
[ github ]

XS Leaks

Security guidelines and best practices covering x s leaks.

[ github ]

XSS Filter Evasion

Injection & Input

Security guidelines and best practices covering x s s filter evasion.

XSS
[ github ]

Zero Trust Architecture

Security guidelines and best practices covering zero trust architecture.

[ github ]