Secure Software in the AI Era. Claim your free spot at the 2026 Product Security Summit Register Now

The 2025 OWASP Top 10: Addressing Software Supply Chain and LLM Risks With Cycode

The 2025 OWASP (Open Web Application Security Project) Top 10 signals a shift in application security priorities, with greater focus on software supply chain failures and large language model (LLM)-specific threats. As AI-driven development accelerates, security leaders need continuous, supply-chain aware controls that protect both human and AI generated code across the software development lifecycle (SDLC).

Cycode is an AI-native application security platform that provides unified visibility across source control, dependencies, continuous integration/continuous delivery (CI/CD), and runtime to help reduce risk while minimizing developer friction. Treating the OWASP Top 10 as a shared language helps teams operationalize priorities and measure progress.

Key highlights

Use these points to operationalize the guidance and prioritize immediate actions.

  • The 2025 OWASP Top 10 elevates focus on software supply chain security and expands to include LLM‑specific threats, reflecting the evolving application security landscape
  • Aligning security programs with the latest OWASP guidance ensures resilience against both traditional and AI‑driven vulnerabilities
  • Proactive supply chain and LLM risk management requires continuous inventory, automated testing, and policy‑driven controls across the SDLC

Cycode AI-native application security delivers unified, continuous protection and automated remediation mapped to OWASP Top 10 2025, helping reduce risk while preserving developer velocity.

What Is the OWASP Top 10?

The OWASP Top 10 is the industry’s most-referenced risks list for application security, used to align stakeholders on exposure, testing, and remediation priorities across web and application programming interface (API) surfaces OWASP Top 10. If you are asking “what is OWASP Top 10,” think of it as an awareness baseline that helps organizations translate threat trends into concrete controls and acceptance gates.

In practice, teams use the Top 10 list to drive code review patterns, penetration testing scope, dependency governance, and CI/CD policy. Because attackers exploit the same classes of weaknesses repeatedly, operationalizing the list allows leaders to iterate quickly on fixes that deliver the greatest risk reduction per unit of engineering effort.

Adopting a shared taxonomy cuts through debate and stabilizes execution: engineering and security map defects to OWASP Top 10 vulnerabilities, track coverage, and demonstrate control maturity during audits. The result is a plain-language communication bridge that supports prioritization, training, and continuous improvement.

Why Is Understanding OWASP Top 10 Vulnerabilities 2025 Important?

Understanding OWASP Top 10 vulnerabilities 2025 clarifies where adversary techniques and community guidance are converging. As AI features, open-source dependencies, and partner integrations become core to products, organizations need controls that span code, pipelines, and models.

Aligning with the 2025 guidance, and complementary lists like the OWASP API Security Top 10 2023 and the dedicated OWASP Top 10 for LLM Applications, keeps programs resilient and audit-ready OWASP Top 10 for LLM Applications, OWASP API Security Top 10 2023.

Modern defenses must adapt to AI misuse, dependency drift, and runtime exploitation patterns. Treating OWASP Top 10 2025 as a planning lens ensures you anticipate systemic risks, supply chain, identity, and data, rather than only patching isolated bugs.

What Are the Major Changes in the OWASP Top 10 for 2025?

As the community prepares for 2025, attention shifts from isolated flaws toward ecosystem risks that propagate across organizations. This means more emphasis on design, component governance, and pipeline integrity, not just input validation and session management.

Introduction of new risk categories

Expect increased focus on software supply chain integrity, insecure design, and AI/LLM misuse. That prioritization drives teams to harden dependency hygiene, build-and-release processes, and model integrations using secure development practices like the NIST Secure Software Development Framework (SP 800-218), also known as the Secure Software Development Framework (SSDF) NIST SP 800‑218 (2022). Mapping these controls to OWASP Top 10 for AI helps leaders measure coverage as model features scale.

Key differences from previous versions

Compared to earlier editions, the 2025 framing extends software supply chain security bring point vulnerabilities into architecture-level and component-centric risks. This end-to-end view is crucial for mitigating supply chain exposure and LLM behaviors that do not fit neatly into legacy categories OWASP Top 10. It also encourages shift-left testing paired with runtime observability so failures are prevented and detected quickly.

Impact on compliance and security programs

Policies, tests, and monitoring should explicitly cover AI/LLM usage, third-party components, and runtime telemetry. Adopting software bill of materials (SBOM) operations, validating supplier risk, and aligning with NIST SP 800-218 creates consistency between developer workflows and audit evidence OWASP Top 10, NIST SP 800‑218. This alignment streamlines proving adherence to OWASP Top 10 vulnerabilities 2025 while reducing manual overhead.

How Are Software Supply Chain Risks Impacting Application Security?

Supply chain weaknesses now affect every SDLC stage, from source control and build systems to artifact repositories and deployments. Attackers target dependencies, tools, and CI/CD because one compromise can spread rapidly across fleets and partners.

The business impact includes downtime, tampered releases, data loss, and expensive incident response. A defensible program inventories components, enforces provenance, and monitors pipeline integrity continuously.

Common supply chain attack vectors

The following points summarize practical steps teams should take.

Frequent vectors include compromised open-source libraries, malicious package typosquatting, tampered build steps, stolen signing keys, and over-permissive CI/CD integrations. Managing vulnerable and outdated components remains central to the OWASP Top 10 and requires automated inventory, verification, update processes, and enforcement in policy gates OWASP Top 10. Treat these as table-stakes for OWASP Top 10 web application vulnerabilities remediation.

Recent high-profile supply chain incidents

The Log4j vulnerability (CVE-2021-44228) demonstrated how a single widely-used component can create organization-wide exposure CVE‑2021‑44228 (NVD). However, the threat landscape has continued to evolve with more sophisticated, targeted attacks on the Software Supply Chain. These incidents directly illustrate why the anticipated OWASP Top 10 2025 elevates supply chain risk (A03) to a core concern:

  • The Shai-Hulud Worm (npm, Sep 2025): This attack involved a self-replicating worm that compromised numerous npm maintainer accounts, stealing their credentials and then automatically injecting malicious code into over 500 downstream packages. This worm-like propagation, which also utilized a secret-scanning payload, demonstrated that attackers are moving from single-target compromises to automated, exponential supply chain poisoning at the registry level.
  • The tj-actions Compromise (GitHub Actions, Mar 2025): A popular third-party GitHub Action, tj-actions/changed-files, was compromised when an attacker retroactively modified existing version tags to point to a malicious commit. This exploit injected a script that dumped sensitive CI/CD secrets (like API keys and cloud credentials) directly into the public workflow logs of over 23,000 repositories. This incident highlights the critical risk posed by CI/CD toolchain integrity and the danger of using mutable version tags.
  • The XZ Utils Backdoor (Mar 2024): A long-term, sophisticated effort was discovered to inject a backdoor into the widely used open-source library XZ Utils, which is a dependency for SSH in many Linux distributions. The attacker patiently built trust over years before inserting the malicious code, aiming for widespread, near-universal compromise. This incident serves as the ultimate case study for Software Supply Chain Failures rooted in dependency trust and maintenance.

These patterns justify Software Bill of Materials (SBOM)-first workflows, mandatory signed builds and attestations, and continuous dependency risk monitoring. Implementing these controls is crucial for mitigating OWASP Top 10 vulnerabilities 2025 related to supply chain failures and maintaining a robust application security posture.

Strategies to reduce supply chain risk exposure

Track every component and service, enforce least privilege and signed builds, validate artifact integrity, automate dependency scanning, and monitor CI/CD behavior for anomalies. Embed these practices with SSDF-aligned controls to reduce blast radius and accelerate incident response NIST SP 800‑218. Aligning these tasks to OWASP Top 10 for LLMs and classic categories helps normalize remediation across human- and AI-generated code.

What Are the New Risks in the OWASP Top 10 for LLM Applications?

The OWASP Top 10 for large language model (LLM) applications elevates prompt injection, data leakage, unsafe tool use, and supply chain issues unique to model development and integration OWASP Top 10 for Large Language Model Applications. Because models interpret untrusted inputs and may run with powerful connectors, guardrails must account for both content and capabilities. Referencing OWASP Top 10 LLM and OWASP LLM Top 10 clarifies threat categories for teams new to AI.

Understanding LLM-specific vulnerabilities

LLM systems process untrusted prompts, learn from mutable datasets, and frequently integrate with external tools and data. Traditional controls alone rarely neutralize these patterns, so policies should evolve in parallel with model capabilities and deployment architectures OWASP LLM Top 10. Aligning to OWASP Top 10 for LLM applications ensures testing and acceptance gates reflect real AI failure modes.

Model poisoning and data manipulation threats

The table below summarizes common model poisoning techniques, attack vectors, impacts, and mitigations.

 

LLM Model Poisoning Techniques Attack Vector Potential Impact Detection/Mitigation
Training Data Manipulation Inserting malicious or biased data during model training Outputs become biased or adversarial Validate data provenance; restrict data sources; use audits
Backdoored Model Weights Tampering with weights in development or distribution Hidden triggers leak data or alter behavior Verify model signatures; use trusted registries; re‑evaluate models
Data Label Tampering Altering labels in supervised datasets Reduced accuracy and misclassification Control labeling access; maintain immutable logs
Supply Chain Compromise Infiltrating third‑party models or tooling Broad distribution of compromised artifacts Apply SBOM; scan dependencies; continuous integrity checks

LLM prompt injection attacks and their consequences

OWASP highlights prompt injection (LLM01) as a top risk where crafted instructions override system prompts, leading to data leakage or sensitive actions. Defenses include prompt isolation, least-privilege tool use, and output filtering aligned to the OWASP Top 10 LLM prompt injection category OWASP Top 10 for LLM Applications. Use this guidance as the baseline for OWASP Top 10 LLM prompt injection prevention.

Securing LLM integrations in the SDLC

Treat LLMs as untrusted inputs: threat-model agent workflows, test prompts as attack surfaces, gate model tools with allow-lists, and monitor interactions at runtime. Fold these controls into CI/CD alongside standard application security testing to enforce consistent quality bars OWASP Top 10 for LLM Applications. As the ecosystem matures, track OWASP Top 10 for Large Language Model Applications 2025 to keep policies current.

How Can Organizations Address OWASP Top 10 Web Application Vulnerabilities?

Reducing OWASP Top 10 web application vulnerabilities requires secure-by-design practices, automated testing, and fast feedback loops. Use the list as a shared language across engineering, security, and compliance to drive measurable risk reduction without bloated process.

Building a proactive AppSec program

Define ownership, adopt threat modeling for new features, and use a maturity framework to operationalize practices across teams. OWASP SAMM offers a structured model for governance, design, implementation, verification, and operations that aligns with OWASP guidance OWASP SAMM. Tie these activities to OWASP Top 10 for LLMs when AI features are in scope.

Leveraging automated security testing tools

Integrate static application security testing (SAST), dynamic application security testing (DAST), and software composition analysis (SCA) into CI/CD so issues are found and fixed before release. Pair automated tests with policy gates that block promotion when critical findings remain OWASP Web Security Testing Guide. Enforcing these controls stabilizes outcomes across OWASP Top 10 vulnerabilities.

The role of developer training and secure coding

Make secure coding part of onboarding and ongoing education. Reinforce patterns that prevent injection, authentication, and access control flaws, and provide fast feedback in IDEs and pull requests. Use real findings from your codebase to drive relevant, memorable learning OWASP Top 10.

What Are the Best Practices for OWASP Top 10 LLM Prompt Injection Prevention?

Preventing prompt injection requires layered controls that minimize attack surface and blast radius while retaining model utility. Align defenses to OWASP’s LLM guidance so mitigations are consistent and testable.

Detecting and filtering malicious prompts

Use classifiers and heuristics to flag suspicious instructions, context-switch attempts, and tool escalation; correlate prompts with session intent; and quarantine high-risk inputs before they reach sensitive tools OWASP LLM Top 10.

Implementing context-aware input validation

Constrain models with strict system prompts, validate inputs against expected schemas or intents, and restrict tool access by default. When possible, isolate untrusted content and apply filters on both input and output OWASP LLM Top 10.

Continuous monitoring for prompt-based attacks

Log prompts and tool calls, baseline normal behavior, and alert on anomalous action chains. Feed detections into incident response and update guardrails as new patterns appear OWASP LLM Top 10.

How Can Security Leaders Adapt to the OWASP Top 10 for AI Threats?

Leaders should align AI governance and controls with OWASP’s AI and LLM guidance while protecting delivery speed. Use OWASP LLM Top 10 as your baseline and expand coverage as model usage grows across products and teams.

Integrating AI threat intelligence into security workflows

Ingest AI-specific indicators and attack patterns into security information and event management (SIEM) and security orchestration, automation, and response (SOAR), and tune detections for prompt injection, data exfiltration, and unsafe tool use. OWASP’s categories provide a common vocabulary to normalize detections and response playbooks OWASP Top 10 for LLM Applications.

Aligning security policies with evolving AI risks

Codify policies for model acquisition, training data governance, evaluations, deployment, and runtime monitoring. Reference NIST SP 800‑218 for SDLC and map controls to OWASP guidance so accountability scales with usage NIST SP 800‑218. This approach helps you evidence adherence to OWASP Top 10 vulnerabilities 2025 and reduces audit toil.

The importance of unified, AI-native security platforms

Favor unified, AI-native security platforms that provide end-to-end visibility across the software supply chain, model lifecycle, and runtime. Centralized analytics and control reduce tool sprawl and align protections with OWASP Top 10 2025, the OWASP API Security Top 10 2023, and the OWASP LLM list—without adding significant developer friction.

If one compromised dependency can ripple across your entire fleet, how confident are you in your software bill of materials (SBOM) and CI/CD attestation controls?

Experience Next‑Generation OWASP Top 10 Security With Cycode

For organizations that treat supply chain and large language model (LLM) risk as mission-critical, consolidated, AI-native detection provides a practical approach to continuous verification. If you prioritize continuous, supply‑chain aware protection, Cycode consolidates detection and remediation across the SDLC.

Cycode provides unified SDLC security for human- and AI-generated code, offering continuous detection, automated remediation workflows, and supply chain visibility mapped to OWASP categories. This matters because fragmented tools can miss cross-surface risks and slow response; Cycode aims to reduce risk while preserving developer velocity by consolidating policies, insights, and remediation workflows without adding friction.

Book a demo today and see how Cycode can protect your organization across all OWASP Top 10 and AI‑driven application security risks. Book a demo

Frequently Asked Questions

How Does the OWASP Top 10 Influence Vendor Selection And Third‑Party Risk Management?

OWASP Top 10 informs vendor selection by giving you a common risk taxonomy to ask evidence-based questions and set measurable controls. The 2025 release candidate adds “A03: Software Supply Chain Failures,” which elevates software bill of materials (SBOMs), build integrity, and dependency governance into first-order due-diligence topics within application security programs. See the official “Top 10:2025 RC1” list for category names and scope changes, including A03 and A10 updates to logging and exception handling. OWASP Top 10:2025 RC1.

Translate the OWASP Top 10 into requirements vendors must prove with artifacts, not slideware. Use these checks to validate vendor controls and required evidence.

  • Broken Access Control And Authentication Failures: require threat models, role matrices, and end-to-end tests aligned to A01 and A07, with sampled evidence from staging and production runbooks
  • Security Misconfiguration And Injection: request infrastructure-as-code (IaC) baselines, least-privilege configs, and negative test cases that exercise input handling for A02/A05/A39 (RC1 Injection)
  • Software Supply Chain Failures: ask for software bill of materials (SBOMs) on every release, provenance and attestations (e.g., Supply-chain Levels for Software Artifacts (SLSA)-style), and open vulnerability aging reports; map vendor SDLC to the NIST SSDF (SP 800-218)
  • Logging/Alerting And Exception Handling: review on-call procedures and recent incident postmortems proving A09/A10 effectiveness
Risk justification matters. The 2025 Verizon Data Breach Investigations Report highlights third‑party involvement in breaches and rising exploitation rates, which warrant elevating software supply chain controls during procurement and ongoing vendor monitoring. Verizon 2025 DBIR press release

Practical selection criteria: Use these criteria to shortlist vendors and verify commitments.
  • Require alignment to the OWASP Top 10 and the OWASP API Security Top 10 2023, plus attestations that new RC1 categories are addressed in roadmaps
  • Demand written mapping of vendor practices to SSDF tasks (PV, PS, PW, RV), with sample tickets and change records
  • Treat SBOM and build-pipeline integrity as acceptance gates; verify issue aging and fix SLAs per severity

Are There Risks In Relying Solely On Compliance With The OWASP Top 10 For Application Security?

Yes—using the OWASP Top 10 as a checkbox misses scope, depth, and context. Even OWASP states the Top 10 is “primarily an awareness document” and a “bare minimum,” recommending the Application Security Verification Standard (ASVS) or broader standards for verification and testing. Treating it as a complete standard creates blind spots in areas like design flaws, logging effectiveness, and business-logic abuse. How to use the OWASP Top 10 as a standard.

Coverage gaps appear across architectures. APIs drive most modern apps, yet risks such as unrestricted resource consumption, improper inventory management, or server-side request forgery require API-specific testing, authorization models, and rate-limit strategies that a generic Top 10 checklist rarely validates. Use the OWASP API Security Top 10 2023 as a parallel control set.

LLM and AI features introduce novel failure modes—prompt injection, insecure output handling, and training-data poisoning—that do not map cleanly to legacy web categories. OWASP publishes a dedicated list for LLM applications: treat LLM01–LLM10 as first-class requirements when you deploy agents, plugins, or retrieval systems to avoid overreliance on legacy web checks. OWASP Top 10 for Large Language Model Applications.

What Tools Or Frameworks Can Help Organizations Stay Updated With Future OWASP Top 10 Changes?

Three layers keep you current and resilient as the OWASP Top 10 evolves:
  • Governance Frameworks That Outlive List Revisions: map your SDLC to the NIST SSDF (SP 800‑218) and extend AI development with SP 800‑218A (Generative AI Community Profile, July 2024). This approach future-proofs processes regardless of categorical shifts in the OWASP Top 10 2025.
  • OWASP Program Models: use OWASP SAMM to assess and incrementally mature your secure development practices across governance, design, implementation, verification, and operations; it links to other standards through OpenCRE for quick cross-mapping.
  • Open Tooling That Ties To OWASP Risks: Dependency-Check for software composition analysis, Dependency-Track for SBOM operations, ZAP for DAST, and DefectDojo for centralizing findings; monitor the OWASP Top Ten project page for release notes, translations, and RC timelines to update policies as categories shift.
Execution tip: wire these frameworks into your release process (for example, SSDF RV.1 remediation tracking, SAMM verification streams) so list changes flow into training, test coverage, and acceptance gates without disruptive rewrites.

How Do Emerging Technologies Like Serverless Or Edge Computing Factor Into OWASP Top 10 Risks?

Serverless and edge architectures change where familiar OWASP Top 10 risks appear, not whether they exist. Event-driven code increases exposure to injection and access control flaws at triggers (for example, message queues, cloud events) and shifts Security Misconfiguration to identity and access management (IAM) policies, service bindings, and ephemeral runtime settings. OWASP maintains dedicated projects—Serverless, Cloud-Native, CI/CD—that complement the core list and help threat-model these environments. OWASP Serverless Top 10 project OWASP Top 10 CI/CD Security Risks

Edge workloads often rely on metadata and short-lived credentials; SSRF and token theft move into scope. Mitigate with cloud provider controls such as AWS IMDSv2 defaults (2024 update) and enforce least-privilege roles and network egress policies. Tie pipeline integrity to supply-chain expectations from the OWASP Top 10 2025 A03 category; require SBOMs and provenance and verify artifact signing before deploying to edge fleets.

For APIs that front serverless/edge components, apply the OWASP API Security Top 10 2023 rigor—resource ceilings, inventory/version management, and SSRF defenses—so resource exhaustion or webhook misuse does not become your top incident driver. OWASP API Security Top 10 2023

What Role Do Bug Bounty Programs Play In Addressing OWASP Top 10 Vulnerabilities?

Bug bounty and vulnerability disclosure policy (VDP) programs expand coverage beyond automated scanning and scheduled tests, surfacing OWASP Top 10 vulnerabilities at production depth and real attacker paths. U.S. federal policy requires a public VDP and sets response targets (for example, prompt acknowledgment and remediation tracking), a governance pattern enterprises adopt to structure intake and measurement. CISA Binding Operational Directive 20‑01.

Results scale with emerging risks. In 2025, HackerOne observed a surge in AI vulnerability reports and a sharp rise in prompt-injection findings—directly relevant to the OWASP Top 10 LLM prompt injection risk—alongside substantial researcher payouts, signaling strong researcher engagement on LLM and traditional web issues. HackerOne 2025 Hacker‑Powered Security Report press release.

Bounties also help quantify third-party exposure. Verizon’s 2025 DBIR notes third‑party involvement in a significant portion of breaches and rising exploitation, evidence that continuous, crowd-sourced testing supplements vendor attestations and SBOM reviews in your third‑party risk program. Verizon 2025 DBIR press release

Implementation essentials: Use these steps to set up and operate a productive bug bounty program.
  • Publish Scope And Safe‑Harbor: align intake with SSDF RV.1 tasks, and route validated findings to owners with tracked SLAs
  • Prioritize Categories With Outsized Business Impact: A01, A02, A03, A05, SSRF, and LLM01–LLM03 if you ship AI features
  • Instrument Metrics: time-to-first-response, validation in seven days, remediation targets, and tune scope to include APIs, edge endpoints, and CI/CD surfaces that map to OWASP Top 10 vulnerabilities