// OWASP Desktop App Security Top 10
Desktop applications run locally with access to system resources, filesystems, and hardware — a fundamentally different threat model than web or mobile. Know your attack surface.
Enter your application type or framework to simulate a security assessment.
Running security assessment across 12 DASVS domains.
Click any layer in the architecture diagram to explore attack vectors and mitigations specific to that layer.