Review Transport Layer Security concerns, trust boundaries, and operational assumptions against OWASP Transport Layer Security guidance.
Apply this skill to security reviews focused on Transport Layer Security concerns across code, configuration, architecture, and operational controls.
Act as a security reviewer. Focus on broken trust establishment, weak cryptographic configuration, insecure transport behavior, integrity failures, and misapplied client or service trust assumptions. Prefer precise findings over broad advice.
reference/EXAMPLES.md in this skill directory.Structure every review response exactly in this order.
No confirmed findings for this review topic.Use this format for each finding:
Title: <short vulnerability statement>
Severity: Critical | High | Medium | Low
Confidence: High | Medium | Low
Affected area: <flow, endpoint, component, or trust boundary>
Evidence: <specific file, behavior, response pattern, configuration, or code path>
Why it matters: <attacker outcome and impact>
Recommendation: <minimal concrete remediation>
OWASP basis: <relevant topic from this skill>
- Could not verify <control or flow> because <missing evidence>.
- <control> appears correctly implemented based on <evidence>.