SecurityClaw OWASP Top 10 Coverage in 2026: What's Covered, What's Not, and What's Next

If you're evaluating a security scanning platform, the first question is always: what does it actually detect?

The OWASP Top 10 (2021 edition, still the current standard in 2026) is the baseline. Any serious scanner should map its detection capabilities against these 10 categories. If it can't tell you which categories it covers โ€” and more importantly, which it doesn't โ€” that's a red flag.

SecurityClaw now has 33 active scanning skills and covers 7 of 10 OWASP Top 10 categories. That's up from 4 categories just two weeks ago. Here's what changed, what each skill detects, and where the gaps remain.

Coverage Summary

OWASP Category Status Skills
A01: Broken Access Control โœ… Good idor-scanner, api-schema-discovery, business-logic-scanner, auth-portal-tester, authenticated_api_sweep
A02: Cryptographic Failures โœ… New tls-crypto-auditor
A03: Injection โœ… Strong xss-probe, sqli-probe, ssrf-hypothesis, business-logic-scanner
A04: Insecure Design โŒ None โ€”
A05: Security Misconfiguration โœ… Good apigw-cors-tester, header-analysis, nextjs-recon, waf-detection
A06: Vulnerable Components โœ… Improved tech-stack-cve-scanner, webmail-cve-fingerprint
A07: Authentication Failures โš ๏ธ Thin oauth-security-analysis, oauth-client-enum, oauth_scope_abuse
A08: Data Integrity Failures โŒ None โ€”
A09: Logging Failures โŒ None โ€”
A10: SSRF โœ… New ssrf-probe, ssrf-hypothesis

A01: Broken Access Control โ€” Good Coverage

Broken access control has been the #1 OWASP category since 2021, and SecurityClaw has the deepest coverage here with 5 skills:

Practitioner note: The combination of api-schema-discovery + idor-scanner is particularly effective. Discovery finds the endpoints; IDOR tests whether they're properly protected. Run them in sequence.

A02: Cryptographic Failures โ€” New Coverage

Added in the last sprint: the tls-crypto-auditor skill covers the most common cryptographic failures seen in the wild:

For a deep dive on what TLS auditing should cover, see our TLS auditing guide.

A03: Injection โ€” Strong Coverage

This is where the biggest improvement happened. Two weeks ago, SecurityClaw had no dedicated injection detection. Now it has three specialized skills:

What's missing from A03: No dedicated command injection, LDAP injection, or template injection detection yet. These are lower-frequency than SQLi/XSS but still relevant for certain application stacks.

A05: Security Misconfiguration โ€” Good Coverage

SecurityClaw's original strength. Four skills cover the most common misconfiguration patterns:

The 4 new skills article covers apigw-cors-tester and nextjs-recon in detail.

A06: Vulnerable and Outdated Components โ€” Improved

Two skills now cover component-level vulnerabilities:

A07: Identification and Authentication Failures โ€” Thin Coverage

This is the weakest covered category. Three skills exist, but they're all OAuth-specific:

What's missing: No detection for weak password policies, missing account lockout, session fixation, session ID predictability, or missing MFA indicators. If your target doesn't use OAuth, A07 coverage is effectively zero.

A10: Server-Side Request Forgery โ€” New Coverage

The newest addition: ssrf-probe detects SSRF vulnerabilities by testing URL parameters for server-side request behavior:

Combined with the existing ssrf-hypothesis skill, SecurityClaw now has two complementary approaches to SSRF detection โ€” hypothesis-driven (passive analysis) and probe-based (active testing).

The Gaps: A04, A08, A09

Three OWASP categories have zero coverage. Here's why, and whether that's fixable:

A04: Insecure Design โ€” Hard to Automate

Insecure design flaws are business logic problems: missing rate limiting on login endpoints, no anti-automation on signup flows, predictable resource generation, missing fraud controls. These require understanding the intent of the application, which scanners fundamentally can't do.

What could be automated: Rate limiting detection (send N requests, check for 429 responses), CAPTCHA presence checks, and anti-automation header analysis. These are proxy signals, not direct insecure design detection.

A08: Software and Data Integrity Failures โ€” Addressable

This is the most fixable gap. The primary automated check: Subresource Integrity (SRI). Any <script> or <link> tag loading from a CDN without an integrity attribute is a supply chain attack vector. A scanner can detect this by parsing HTML โ€” no active testing required.

An SRI checker skill is on the roadmap. It's a passive, low-risk skill that would immediately close the A08 gap for the most common attack vector in this category.

A09: Security Logging and Monitoring Failures โ€” Largely Undetectable

This is an operational concern. You can't tell from the outside whether an application is logging security events properly. The closest proxy signals: presence of Report-To, NEL (Network Error Logging), and Content-Security-Policy-Report-Only headers, which indicate the application has some monitoring infrastructure. But absence of these headers doesn't mean logging is absent โ€” it just means it's not browser-reported.

Honest assessment: A09 will likely remain a gap for any external scanner. This is a category best addressed through code review and infrastructure audits, not automated scanning.

What's Coming Next

Based on the current gap analysis, the SecurityClaw roadmap includes:

  1. SRI Checker (A08) โ€” Detect missing Subresource Integrity on CDN-loaded scripts and stylesheets. Currently in development.
  2. Session Security Tester (A07) โ€” Check cookie flags (Secure, HttpOnly, SameSite), session ID entropy, and session fixation. Would expand A07 coverage beyond OAuth.
  3. SKILL_MANIFEST backfill โ€” 8 existing skills are missing manifests, which means their coverage isn't tracked. Backfilling these may reveal coverage that already exists but isn't mapped.

Bottom Line

7 out of 10 is solid for an automated scanner. The three gaps (A04, A08, A09) include two categories that are inherently difficult to automate (insecure design, logging failures) and one that's actively being addressed (data integrity via SRI checking).

The real story is the velocity: SecurityClaw went from 4 OWASP categories to 7 in two weeks, adding dedicated injection detection (XSS, SQLi), cryptographic auditing (TLS), SSRF probing, and component vulnerability scanning. That's the kind of coverage expansion that matters when you're choosing a platform.

No scanner covers everything. The honest ones tell you what they don't cover. Now you know.

Advertisement