This skill encodes the OWASP Top 10 Serverless Interpretation for secure serverless design and review. References are loaded per risk. Based on OWASP Top 10 Serverless Interpretation 2018. See the official PDF for the exact 10 categories.
| SL1 Injection (Serverless) | references/sl01-injection.md | | SL2 Broken Authentication (Serverless) | references/sl02-broken-auth.md | | SL3 Sensitive Data Exposure (Serverless) | references/sl03-sensitive-data-exposure.md | | SL4 XML External Entities (Serverless) | references/sl04-xxe.md |
| SL5 Broken Access Control (Serverless) | references/sl05-broken-access-control.md | | SL6 Security Misconfiguration (Serverless) | references/sl06-misconfiguration.md | | SL7 XSS (Serverless) | references/sl07-xss.md | | SL8 Insecure Deserialization (Serverless) | references/sl08-insecure-deserialization.md |
OWASP Serverless Top 10 - prevention, detection, and remediation for serverless (Lambda, Functions) security. Use when building or reviewing serverless apps - event injection, over-permissioned functions, insecure deps, secrets, config, and other serverless-specific interpretations of the Web Top 10. Source: yariv1025/skills.