Skip to main content

owasp-security

Enhances code security by applying OWASP standards for vulnerability prevention and secure coding practices.

Install this skill

or
0/100

Security score

The owasp-security skill was audited on Feb 15, 2026 and we found 14 security issues across 2 threat categories, including 5 critical. Review the findings below before installing.

Categories Tested

Security Issues

critical line 228

Direct command execution function call

SourceSKILL.md
228**Watch for:** `pickle`, `eval()`, `exec()`, `os.system()`, `subprocess` with `shell=True`
critical line 243

Direct command execution function call

SourceSKILL.md
243**Watch for:** `ObjectInputStream`, `Runtime.exec()`, XML parsers without XXE protection, JNDI lookups
high line 208

Eval function call - arbitrary code execution

SourceSKILL.md
208eval(userCode)
critical line 211

Eval function call - arbitrary code execution

SourceSKILL.md
211**Watch for:** `eval()`, `innerHTML`, `document.write()`, prototype chain manipulation, `__proto__`
critical line 228

Eval function call - arbitrary code execution

SourceSKILL.md
228**Watch for:** `pickle`, `eval()`, `exec()`, `os.system()`, `subprocess` with `shell=True`
high line 394

Eval function call - arbitrary code execution

SourceSKILL.md
394eval(parse(text = user_input))
critical line 402

Eval function call - arbitrary code execution

SourceSKILL.md
402**Watch for:** `eval()`, `parse()`, `source()`, `system()`, file path manipulation
medium line 73

System command execution

SourceSKILL.md
73os.system(f"convert {filename} output.png")
high line 228

System command execution

SourceSKILL.md
228**Watch for:** `pickle`, `eval()`, `exec()`, `os.system()`, `subprocess` with `shell=True`
high line 402

System command execution

SourceSKILL.md
402**Watch for:** `eval()`, `parse()`, `source()`, `system()`, file path manipulation
medium line 73

Python os.system command execution

SourceSKILL.md
73os.system(f"convert {filename} output.png")
high line 228

Python os.system command execution

SourceSKILL.md
228**Watch for:** `pickle`, `eval()`, `exec()`, `os.system()`, `subprocess` with `shell=True`
medium line 76

Python subprocess execution

SourceSKILL.md
76subprocess.run(["convert", filename, "output.png"], shell=False)
low line 384

External URL reference

SourceSKILL.md
384factory.setFeature("http://xml.org/sax/features/external-general-entities", false)
Scanned on Feb 15, 2026
View Security Dashboard