OWASP TOP 10 / A08:2021
Software and Data Integrity Failures
Code and infrastructure that fail to protect against integrity violations — unsigned updates, insecure deserialization, and CI/CD compromise.
This category covers trusting code or data without verifying its integrity: auto-updates without signature checks, insecure deserialization, and compromised build pipelines (supply-chain attacks like SolarWinds).
If you trust input you didn’t verify, an attacker can substitute malicious code or data.
How to prevent it
Verify digital signatures, use trusted repositories, secure the CI/CD pipeline, and never deserialize untrusted data.
Mapped weaknesses (CWE)
Free tools to test for it
Related terms
Part of the OWASP Top 10 reference. See also the CWE weaknesses and Web Security hub.