[{"data":1,"prerenderedAt":81},["ShallowReactive",2],{"term-o\u002Fowasp-top-10":3,"related-o\u002Fowasp-top-10":61},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":44,"meta":45,"navigation":46,"path":47,"related":48,"seo":55,"sitemap":56,"stem":59,"subcategory":6,"__hash__":60},"terms\u002Fterms\u002Fo\u002Fowasp-top-10.md","OWASP Top 10",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"The OWASP Top 10 is the security industry's greatest hits of web vulnerabilities — the 10 most common, dangerous ways apps get hacked. If your app is safe against these 10, you're way ahead of most. It's updated every few years, and every developer should read it at least once.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"The OWASP Top 10 is a regularly updated consensus document listing the most critical web application security risks. The 2021 edition includes: Broken Access Control, Cryptographic Failures, Injection, Insecure Design, Security Misconfiguration, Vulnerable Components, Authentication Failures, Data Integrity Failures, Logging Failures, and SSRF.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"The security audit covered all OWASP Top 10 categories.\" \u002F \"We addressed every OWASP Top 10 issue before launch.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","The OWASP Top 10 is the security industry's greatest hits of web vulnerabilities — the 10 most common, dangerous ways apps get hacked.","beginner","md","o",{},true,"\u002Fterms\u002Fo\u002Fowasp-top-10",[49,50,51,52,53,54],"OWASP","XSS","SQL Injection","CSRF","Vulnerability","Penetration Testing",{"title":5,"description":41},{"changefreq":57,"priority":58},"weekly",0.7,"terms\u002Fo\u002Fowasp-top-10","3FNzB_I9vgEC6Zys8eymvEyTP5c4TeTcxy6ogwQoL00",[62,66,69,72,75,78],{"title":52,"path":63,"acronym":52,"category":40,"difficulty":64,"description":65},"\u002Fterms\u002Fc\u002Fcsrf","intermediate","CSRF (Cross-Site Request Forgery) is when a bad website hijacks your logged-in session on a good website to do things you didn't ask for.",{"title":49,"path":67,"acronym":49,"category":40,"difficulty":42,"description":68},"\u002Fterms\u002Fo\u002Fowasp","OWASP (Open Web Application Security Project) is the internet's biggest security club.",{"title":54,"path":70,"acronym":6,"category":40,"difficulty":64,"description":71},"\u002Fterms\u002Fp\u002Fpenetration-testing","Penetration testing (pentesting) is hiring ethical hackers to try to break into your own systems before the real bad guys do.",{"title":51,"path":73,"acronym":6,"category":40,"difficulty":64,"description":74},"\u002Fterms\u002Fs\u002Fsql-injection","SQL injection is when a hacker types SQL code into a text field instead of normal text, and your stupid database runs it.",{"title":53,"path":76,"acronym":6,"category":40,"difficulty":42,"description":77},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",{"title":50,"path":79,"acronym":50,"category":40,"difficulty":64,"description":80},"\u002Fterms\u002Fx\u002Fxss","XSS stands for Cross-Site Scripting. Hackers inject their own JavaScript into your site so when other users visit, the evil script runs in their browser.",1776518298801]