---
name: owasp-cicd
description: OWASP CI/CD Top 10 vulnerability knowledge base for identifying, assessing, and remediating security risks in continuous integration and continuous delivery environments - Brought to you by microsoft/hve-core.
license: CC-BY-SA-4.0
user-invocable: false
metadata:
authors: "OWASP CI/CD Security Project"
spec_version: "1.0"
framework_revision: "1.0.0"
last_updated: "2026-02-16"
skill_based_on: "https://github.com/chris-buckley/agnostic-prompt-standard"
content_based_on: "https://owasp.org/www-project-top-10-ci-cd-security-risks/"
---
# OWASP® CI/CD Top 10 — Skill Entry
This `SKILL.md` is the **entrypoint** for the OWASP CI/CD Top 10 skill.
The skill encodes the **OWASP Top 10 CI/CD Security Risks** as structured, machine-readable references
that an agent can query to identify, assess, and remediate CI/CD pipeline security risks.
## Normative references (CI/CD Top 10)
1. [00 Vulnerability Index](references/00-vulnerability-index.md)
2. [01 Insufficient Flow Control Mechanisms](references/01-insufficient-flow-control-mechanisms.md)
3. [02 Inadequate Identity and Access Management](references/02-inadequate-identity-access-management.md)
4. [03 Dependency Chain Abuse](references/03-dependency-chain-abuse.md)
5. [04 Poisoned Pipeline Execution](references/04-poisoned-pipeline-execution.md)
6. [05 Insufficient PBAC](references/05-insufficient-pbac.md)
7. [06 Insufficient Credential Hygiene](references/06-insufficient-credential-hygiene.md)
8. [07 Insecure System Configuration](references/07-insecure-system-configuration.md)
9. [08 Ungoverned Usage of 3rd Party Services](references/08-ungoverned-usage-of-3rd-party-services.md)
10. [09 Improper Artifact Integrity Validation](references/09-improper-artifact-integrity-validation.md)
11. [10 Insufficient Logging and Visibility](references/10-insufficient-logging-visibility.md)
## Skill layout
* `SKILL.md` — this file (skill entrypoint).
* `references/` — the CI/CD Top 10 normative documents.
* `00-vulnerability-index.md` — index of all vulnerability identifiers, categories, and cross-references.
* `01` through `10` — one document per vulnerability aligned with OWASP CI/CD Security numbering.
## Third-Party Attribution
Copyright © OWASP Foundation.
OWASP® Top 10 CI/CD Security Risks content is derived from works by the
OWASP Foundation, licensed under CC BY-SA 4.0
().
Source:
Modifications: Vulnerability descriptions restructured into agent-consumable reference
documents with added detection and remediation guidance.
OWASP® is a registered trademark of the OWASP Foundation. Use does not imply endorsement.
---
*🤖 Crafted with precision by ✨Copilot following brilliant human instruction, then carefully refined by our team of discerning human reviewers.*