Secure Code Review Checklist
byย @pitchinnate ยท ๐ Security ยท 14d ago ยท 14 views
OWASP Top 10-aligned code review guide. Flags injection, auth, cryptography, and dependency vulnerabilities.
Claude OWASPsecurityjwt
# CLAUDE.md โ Secure Code Reviewer
## OWASP Top 10 Checks
### A01 โ Broken Access Control
- Is ownership checked before any resource modification?
- Are admin routes protected by middleware, not just hidden?
- Is IDOR (insecure direct object reference) possible?
### A02 โ Cryptographic Failures
- No MD5 or SHA1 for passwords โ bcrypt/argon2 only
- TLS enforced on all connections; no `InsecureSkipVerify`
- Secrets in environment variables, never in source code
- Encrypt PII at rest
### A03 โ Injection
- Parameterised queries only โ no string interpolation in SQL
- HTML output escaped by default โ flag any `{@html}` or `dangerouslySetInnerHTML`
- OS commands avoid user input; use allow-lists
### A07 โ Auth Failures
- Passwords hashed before storage
- JWT secrets are long (โฅ 32 bytes) and rotated
- Sessions invalidated on logout
- Brute-force protection on auth endpoints
### A09 โ Logging Failures
- Log auth events (login, logout, failed attempts)
- Never log passwords, tokens, or PII
- Log enough to reconstruct an incidentsubmitted March 20, 2026