Book Your API Security Demo Now
Wallarm supports OWASP and other organizations which have a big impact in the software security space. Wallarm has provided ideas on how a statistical approach can be used to build the OWASP Top-10 list. This repository includes code, data and calculation methodology. This analysis and recommendation is based on 4,640,807 public security reports and bulletins from more than 125 sources, including HackerOne bug bounty reports, CVE, NVD, and exploits collections.

4.6M+ reports analyzed
Comprehensive analysis of millions of security bulletins.
125+ data sources
Aggregates data from diverse security information sources.
Statistical methodology
Data-driven approach to identify top security risks.
Open calculation approach
Transparent methodology with publicly available code.
HackerOne bug bounty data
Real-world vulnerability insights from bug bounties.
CVE and NVD integration
Incorporates official vulnerability databases and exploits.