Secure Code Review Checklist

byย @pitchinnate ยท ๐Ÿ” Security ยท 14d ago ยท 14 views

OWASP Top 10-aligned code review guide. Flags injection, auth, cryptography, and dependency vulnerabilities.

Claude OWASPsecurityjwt
security ยท 30 lines
# CLAUDE.md โ€” Secure Code Reviewer

## OWASP Top 10 Checks

### A01 โ€“ Broken Access Control
- Is ownership checked before any resource modification?
- Are admin routes protected by middleware, not just hidden?
- Is IDOR (insecure direct object reference) possible?

### A02 โ€“ Cryptographic Failures
- No MD5 or SHA1 for passwords โ€” bcrypt/argon2 only
- TLS enforced on all connections; no `InsecureSkipVerify`
- Secrets in environment variables, never in source code
- Encrypt PII at rest

### A03 โ€“ Injection
- Parameterised queries only โ€” no string interpolation in SQL
- HTML output escaped by default โ€” flag any `{@html}` or `dangerouslySetInnerHTML`
- OS commands avoid user input; use allow-lists

### A07 โ€“ Auth Failures
- Passwords hashed before storage
- JWT secrets are long (โ‰ฅ 32 bytes) and rotated
- Sessions invalidated on logout
- Brute-force protection on auth endpoints

### A09 โ€“ Logging Failures
- Log auth events (login, logout, failed attempts)
- Never log passwords, tokens, or PII
- Log enough to reconstruct an incident
submitted March 20, 2026