name: security-patterns
description: "Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure coding."
compatibility: "Language-agnostic patterns with framework-specific examples in references."
allowed-tools: "Read Write Bash Grep"
Security Patterns
Essential security patterns for web applications.
OWASP Top 10 Quick Reference
Rank
Vulnerability
Prevention
A01
Broken Access Control
Check permissions server-side, deny by default
A02
Cryptographic Failures
Use TLS, hash passwords, encrypt sensitive data
A03
Injection
Parameterized queries, validate input
A04
Insecure Design
Threat modeling, secure defaults
A05
Security Misconfiguration
Harden configs, disable unused features
A06
Vulnerable Components
Update dependencies, audit regularly
A07
Auth Failures
MFA, rate limiting, secure session management
A08
Data Integrity Failures
Verify signatures, use trusted sources
A09
Logging Failures
Log security events, protect logs
A10
SSRF
Validate URLs, allowlist destinations
Input Validation
# WRONG - Trust user input
def search(query):
return db.execute(f"SELECT * FROM users WHERE name = '{query}'")
# CORRECT - Parameterized query
def search(query):
return db.execute("SELECT * FROM users WHERE name = ?", [query])
Validation Rules
Always validate:
- Type (string, int, email format)
- Length (min/max bounds)
- Range (numeric bounds)
- Format (regex for patterns)
- Allowlist (known good values)
Never trust:
- URL parameters
- Form data
- HTTP headers
- Cookies
- File uploads
Output Encoding
// WRONG - Direct HTML insertion
element.innerHTML = userInput;
// CORRECT - Text content (auto-escapes)
element.textContent = userInput;
// CORRECT - Template with escaping
render(`<div>${escapeHtml(userInput)}</div>`);
Hash passwords with bcrypt/argon2 (cost factor 12+)
Implement rate limiting on login
Use secure session tokens (random, long)
Set secure cookie flags (HttpOnly, Secure, SameSite)
Implement account lockout after failed attempts
Support MFA for sensitive operations
Authorization
# WRONG - Check only authentication
@login_required
def delete_post(post_id):
post = Post.get(post_id)
post.delete()
# CORRECT - Check authorization
@login_required
def delete_post(post_id):
post = Post.get(post_id)
if post.author_id != current_user.id and not current_user.is_admin:
raise Forbidden("Not authorized to delete this post")
post.delete()
DO:
- Use environment variables or secrets manager
- Rotate secrets regularly
- Use different secrets per environment
- Audit secret access
DON'T:
- Commit secrets to git
- Log secrets
- Include secrets in error messages
- Share secrets in plain text