LH
OWASP Top 10 for Laravel developers - what to watch for?
I am preparing for a client security audit and want to make sure my Laravel app covers the OWASP Top 10. Laravel handles many things out of the box, but I want to know what commonly gets missed.
What I believe Laravel handles by default:
- SQL Injection: Eloquent uses prepared statements
- CSRF: Built-in CSRF token middleware
- XSS: Blade double curly braces auto-escape output
What I am less sure about:
- Broken Access Control: Are Gates and Policies enough?
- Security Misconfiguration: What production settings are often missed?
- Server-Side Request Forgery: How to prevent SSRF in apps that fetch external URLs?
Has anyone gone through a formal security audit on a Laravel project? What were the most common findings?