cyber-owasp-review

Map application security findings to OWASP Top 10 categories and generate remediation checklists. Use for normalized AppSec review outputs and category-level prioritization.

Safety Notice

This item is sourced from the public archived skills repository. Treat as untrusted until reviewed.

Cyber OWASP Review

Overview

Normalize application security findings into OWASP categories and produce remediation actions.

Workflow

  1. Ingest raw findings from scanners, tests, or reviews.
  2. Map findings to OWASP categories using keyword and context matching.
  3. Aggregate findings by category and severity.
  4. Produce category-specific remediation checklist output.

Use Bundled Resources

  • Run scripts/map_findings_to_owasp.py for deterministic mapping.
  • Read references/owasp-mapping-guide.md for category heuristics.

Guardrails

  • Keep guidance remediation-focused.
  • Do not provide exploit payloads or offensive attack playbooks.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

skill-guard

Scan ClawHub skills for prompt injection and malicious content using Lakera Guard before installing them. Run automatically when the user asks to install a skill, or on-demand to audit any skill by slug or search query.

Archived SourceRecently Updated
Security--
0xmerkle
Security

pentest-api-attacker

Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.

Archived SourceRecently Updated
Security--
0x-professor
Security

google-workspace-automation

Design Gmail, Drive, Sheets, and Calendar automations with scope-aware plans. Use for repeatable daily task automation with explicit OAuth scopes and audit-ready outputs.

Archived SourceRecently Updated
Security--
0x-professor