home / skills / openclaw / skills / ai-auth-check
This skill audits authentication flows for security vulnerabilities, helping you strengthen login, session management, and token handling.
npx playbooks add skill openclaw/skills --skill ai-auth-checkReview the files below or copy the command above to add this skill to your agents.
---
name: auth-checker
description: Audit authentication flows for security vulnerabilities
---
# Auth Checker
Scan your auth implementation for security holes. Catches the stuff that gets you hacked.
## Quick Start
```bash
npx ai-auth-check ./src/auth/
```
## What It Does
- Audits login/signup flows for vulnerabilities
- Checks session management security
- Identifies weak password policies
- Flags insecure token handling
## Usage Examples
```bash
# Audit auth directory
npx ai-auth-check ./src/auth/
# Scan specific auth file
npx ai-auth-check ./src/lib/auth.ts
# Full project scan
npx ai-auth-check ./src --recursive
```
## What It Catches
- Hardcoded credentials
- Missing rate limiting
- Insecure session storage
- JWT vulnerabilities
- Missing CSRF protection
- Weak password validation
## Requirements
Node.js 18+. OPENAI_API_KEY required.
## License
MIT. Free forever.
---
**Built by LXGIC Studios**
- GitHub: [github.com/lxgicstudios/ai-auth-check](https://github.com/lxgicstudios/ai-auth-check)
- Twitter: [@lxgicstudios](https://x.com/lxgicstudios)
This skill audits authentication flows to find security vulnerabilities before they reach production. It analyzes login, signup, session handling, tokens, and password policies to flag common and subtle issues. Use it to get actionable findings and remediation hints for auth-related code.
The tool scans specified source paths for auth-related code patterns, configuration, and runtime handling. It looks for hardcoded secrets, weak password rules, missing rate limits, insecure session or token storage, JWT issues, and absent CSRF protections. Output includes a prioritized list of findings with recommendations and code locations to inspect.
What inputs does the scanner need?
Point it at source paths or specific files containing auth logic; it supports directory and file scanning modes.
Does it fix issues automatically?
No. The tool reports findings and remediation suggestions; developers apply fixes and re-scan.