Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 779

OWASP Mobile Top 10

What is OWASP Mobile Top 10?

OWASP Mobile Top 10An OWASP awareness document that ranks the most critical security risks for mobile applications running on iOS, Android, and similar platforms.


The OWASP Mobile Top 10 is a community-driven awareness document that summarizes the most significant security risks in mobile applications. The 2024 edition covers categories such as Improper Credential Usage, Inadequate Supply Chain Security, Insecure Authentication/Authorization, Insufficient Input/Output Validation, Insecure Communication, Inadequate Privacy Controls, Insufficient Binary Protections, Security Misconfiguration, Insecure Data Storage, and Insufficient Cryptography. It is closely tied to the MASVS (control framework) and MASTG (testing guide). Mobile developers, MSAS/MAST tools, and pentesters use the Mobile Top 10 to prioritize remediation, frame training, and explain mobile-specific risk to non-technical stakeholders.

Examples

  1. 01

    A mobile app team prioritizing fixes for hard-coded API keys under M1 Improper Credential Usage.

  2. 02

    A MAST tool grouping findings by Mobile Top 10 2024 ID in its developer dashboard.

Frequently asked questions

What is OWASP Mobile Top 10?

An OWASP awareness document that ranks the most critical security risks for mobile applications running on iOS, Android, and similar platforms. It belongs to the Compliance & Frameworks category of cybersecurity.

What does OWASP Mobile Top 10 mean?

An OWASP awareness document that ranks the most critical security risks for mobile applications running on iOS, Android, and similar platforms.

How does OWASP Mobile Top 10 work?

The OWASP Mobile Top 10 is a community-driven awareness document that summarizes the most significant security risks in mobile applications. The 2024 edition covers categories such as Improper Credential Usage, Inadequate Supply Chain Security, Insecure Authentication/Authorization, Insufficient Input/Output Validation, Insecure Communication, Inadequate Privacy Controls, Insufficient Binary Protections, Security Misconfiguration, Insecure Data Storage, and Insufficient Cryptography. It is closely tied to the MASVS (control framework) and MASTG (testing guide). Mobile developers, MSAS/MAST tools, and pentesters use the Mobile Top 10 to prioritize remediation, frame training, and explain mobile-specific risk to non-technical stakeholders.

How do you defend against OWASP Mobile Top 10?

Defences for OWASP Mobile Top 10 typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for OWASP Mobile Top 10?

Common alternative names include: OWASP Mobile Top Ten, Mobile Top 10.

Related terms