[{"data":1,"prerenderedAt":77},["ShallowReactive",2],{"term-o\u002Fowasp":3,"related-o\u002Fowasp":60},{"id":4,"title":5,"acronym":5,"body":6,"category":39,"description":40,"difficulty":41,"extension":42,"letter":43,"meta":44,"navigation":45,"path":46,"related":47,"seo":53,"sitemap":54,"stem":57,"subcategory":58,"__hash__":59},"terms\u002Fterms\u002Fo\u002Fowasp.md","OWASP",{"type":7,"value":8,"toc":32},"minimark",[9,14,18,22,25,29],[10,11,13],"h2",{"id":12},"eli5-the-vibe-check","ELI5 — The Vibe Check",[15,16,17],"p",{},"OWASP (Open Web Application Security Project) is the internet's biggest security club. They publish free guides, tools, and a famous top-10 list of the most dangerous web vulnerabilities. If you're building anything that faces the internet, their Top 10 is your security homework.",[10,19,21],{"id":20},"real-talk","Real Talk",[15,23,24],{},"OWASP (Open Web Application Security Project) is a nonprofit foundation that publishes security standards, guidelines, and tools. The OWASP Top 10 is an industry-standard awareness document for the most critical web application security risks, updated periodically.",[10,26,28],{"id":27},"when-youll-hear-this","When You'll Hear This",[15,30,31],{},"\"Follow the OWASP guidelines for input validation.\" \u002F \"We use OWASP ZAP for automated security scanning.\"",{"title":33,"searchDepth":34,"depth":34,"links":35},"",2,[36,37,38],{"id":12,"depth":34,"text":13},{"id":20,"depth":34,"text":21},{"id":27,"depth":34,"text":28},"security","OWASP (Open Web Application Security Project) is the internet's biggest security club.","beginner","md","o",{},true,"\u002Fterms\u002Fo\u002Fowasp",[48,49,50,51,52],"OWASP Top 10","XSS","SQL Injection","CSRF","Vulnerability",{"title":5,"description":40},{"changefreq":55,"priority":56},"weekly",0.7,"terms\u002Fo\u002Fowasp",null,"SZzMGJDWX3kaXTcCiuj_6gsNOdbRZZsWQznS2JDxkNY",[61,65,68,71,74],{"title":51,"path":62,"acronym":51,"category":39,"difficulty":63,"description":64},"\u002Fterms\u002Fc\u002Fcsrf","intermediate","CSRF (Cross-Site Request Forgery) is when a bad website hijacks your logged-in session on a good website to do things you didn't ask for.",{"title":48,"path":66,"acronym":58,"category":39,"difficulty":41,"description":67},"\u002Fterms\u002Fo\u002Fowasp-top-10","The OWASP Top 10 is the security industry's greatest hits of web vulnerabilities — the 10 most common, dangerous ways apps get hacked.",{"title":50,"path":69,"acronym":58,"category":39,"difficulty":63,"description":70},"\u002Fterms\u002Fs\u002Fsql-injection","SQL injection is when a hacker types SQL code into a text field instead of normal text, and your stupid database runs it.",{"title":52,"path":72,"acronym":58,"category":39,"difficulty":41,"description":73},"\u002Fterms\u002Fv\u002Fvulnerability","A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.",{"title":49,"path":75,"acronym":49,"category":39,"difficulty":63,"description":76},"\u002Fterms\u002Fx\u002Fxss","XSS stands for Cross-Site Scripting. Hackers inject their own JavaScript into your site so when other users visit, the evil script runs in their browser.",1776518298735]