• Agents
  • Pricing
  • Blog
Log in
Get started

Security for apps built with AI. Paste a URL, get a report, fix what matters.

Product

  • How it works
  • What we find
  • Pricing
  • Agents
  • MCP Server
  • CLI
  • GitHub Action

Resources

  • Guides
  • Blog
  • Docs
  • OWASP Top 10
  • Glossary
  • FAQ

Security

  • Supabase Security
  • Next.js Security
  • Lovable Security
  • Cursor Security
  • Bolt Security

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Imprint
© 2026 Flowpatrol. All rights reserved.
OWASP Top 10 for Web Applications · 2021

Ten patterns.
Sixty seconds each.

Ten vulnerability classes, measured across thousands of real codebases and maintained by the global security community. Each category explained clearly, with the patterns that introduce it and the fixes that resolve it.

Web Top 10LLM Top 10API Top 10
A01

Change the ID, see what happens

Broken Access Control

The bug where one user can read another user's data just by editing a number in the URL.

Read the story
A02

Plaintext passwords in the table

Cryptographic Failures

The bug where the data is technically stored — just not in a way anyone should have stored it.

Read the story
A03

Quote in the input box

Injection

The bug where user input gets pasted directly into a query, a command, or a template.

Read the story
A04

The bug nobody designed away

Insecure Design

The bug where every line of code is correct and the whole thing still does the wrong thing.

Read the story
A05

The default that ships with everything

Security Misconfiguration

The bug where the code is fine and the settings are doing all the work the wrong way round.

Read the story
A06

The dependency you forgot you installed

Vulnerable and Outdated Components

The bug where a library you never touched ships a CVE and your app inherits it overnight.

Read the story
A07

Login that lets anybody in

Identification and Authentication Failures

The bug where the sign-in flow works perfectly for you and also works perfectly for the attacker.

Read the story
A08

Deploy script with no signature

Software and Data Integrity Failures

The bug where you trust a package, a webhook, or an update without ever checking who sent it.

Read the story
A09

Errors that vanish in production

Security Logging and Monitoring Failures

The bug where the attack worked, the logs are empty, and nobody notices until a customer emails support.

Read the story
A10

Make the server fetch a URL

Server-Side Request Forgery (SSRF)

The bug where a user-supplied URL turns your server into a proxy for the attacker.

Read the story

Scan for all ten.

Flowpatrol tests every category on this list — and proves every finding with a real exploit. Paste a URL, get a report in minutes.

Try it freeWhat we find