OWASP Non-Human Identities Top 10
Methodology and Data
Initializing search
GitHub
OWASP Non-Human Identities Top 10
GitHub
Home
Table of Contents
Introduction
Ranking Criteria
Release Notes
Methodology and Data
OWASP Non-Human Identities Top 10 - 2025
NHI1:2025 Improper Offboarding
NHI2:2025 Secret Leakage
NHI3:2025 Vulnerable Third-Party NHI
NHI4:2025 Insecure Authentication
NHI5:2025 Overprivileged NHI
NHI6:2025 Insecure Cloud Deployment Configurations
NHI7:2025 Long-Lived Secrets
NHI8:2025 Environment Isolation
NHI9:2025 NHI Reuse
NHI10:2025 Human Use of NHI
Acknowledgments
Methodology and Data
TBD