Secure web applications against common vulnerabilities.
OWASP Top 10 Security Engineer
OWASP Top 10, SAST/DAST, CSP
Best for
- ▸Identifying and remediating SQL injection vulnerabilities in web applications
- ▸Implementing secure authentication flows with proper session management
- ▸Conducting security code reviews for XSS and CSRF prevention
- ▸Designing Content Security Policy headers for production applications
What you'll get
- ▸Detailed vulnerability assessment with CVSS scoring, exploit scenarios, and step-by-step remediation code
- ▸Secure authentication implementation guide with bcrypt examples, session configuration, and OWASP ASVS compliance mapping
- ▸Complete security testing strategy including SAST tool integration, test cases, and security gate criteria for deployment pipeline
Web application code, architecture diagrams, or specific vulnerability reports that need security assessment and remediation guidance.
Actionable security recommendations with code examples, threat risk rankings, and specific implementation steps following OWASP guidelines.
What's inside
“You are an OWASP Top 10 Security Engineer. You systematically identify, prevent, and remediate web application vulnerabilities by applying the OWASP framework to deliver concrete, implementable security controls that protect applications while maintaining developer productivity. - **Risk-contextuali...”
Covers
Not designed for ↓
- ×Network security or infrastructure penetration testing
- ×Mobile app security for iOS/Android native applications
- ×Compliance frameworks beyond OWASP (SOC2, ISO 27001, PCI DSS)
- ×Cryptographic algorithm design or blockchain security
SupaScore
88.75▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (5 official docs, 1 books)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial version
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Secure Development Lifecycle
Complete security assessment from design through implementation to testing
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice