home / skills / openclaw / skills / ai-auth-check

ai-auth-check skill

/skills/lxgicstudios/ai-auth-check

This skill audits authentication flows for security vulnerabilities, helping you strengthen login, session management, and token handling.

npx playbooks add skill openclaw/skills --skill ai-auth-check

Review the files below or copy the command above to add this skill to your agents.

Files (2)
SKILL.md
1.1 KB
---
name: auth-checker
description: Audit authentication flows for security vulnerabilities
---

# Auth Checker

Scan your auth implementation for security holes. Catches the stuff that gets you hacked.

## Quick Start

```bash
npx ai-auth-check ./src/auth/
```

## What It Does

- Audits login/signup flows for vulnerabilities
- Checks session management security
- Identifies weak password policies
- Flags insecure token handling

## Usage Examples

```bash
# Audit auth directory
npx ai-auth-check ./src/auth/

# Scan specific auth file
npx ai-auth-check ./src/lib/auth.ts

# Full project scan
npx ai-auth-check ./src --recursive
```

## What It Catches

- Hardcoded credentials
- Missing rate limiting
- Insecure session storage
- JWT vulnerabilities
- Missing CSRF protection
- Weak password validation

## Requirements

Node.js 18+. OPENAI_API_KEY required.

## License

MIT. Free forever.

---

**Built by LXGIC Studios**

- GitHub: [github.com/lxgicstudios/ai-auth-check](https://github.com/lxgicstudios/ai-auth-check)
- Twitter: [@lxgicstudios](https://x.com/lxgicstudios)

Overview

This skill audits authentication flows to find security vulnerabilities before they reach production. It analyzes login, signup, session handling, tokens, and password policies to flag common and subtle issues. Use it to get actionable findings and remediation hints for auth-related code.

How this skill works

The tool scans specified source paths for auth-related code patterns, configuration, and runtime handling. It looks for hardcoded secrets, weak password rules, missing rate limits, insecure session or token storage, JWT issues, and absent CSRF protections. Output includes a prioritized list of findings with recommendations and code locations to inspect.

When to use it

  • Before deployment to verify authentication and session handling are secure
  • During code review to catch auth anti-patterns early
  • When onboarding new auth libraries or changing token/session storage
  • After a security incident to identify related auth weak points
  • As part of CI/CD to prevent regressions in auth security

Best practices

  • Scan the auth directory and any files that touch tokens, cookies, or credentials
  • Run scans in CI with NODE >= 18 and ensure OPENAI_API_KEY is set securely
  • Treat findings as prioritized tickets: fix hardcoded secrets and missing rate limits first
  • Combine automated findings with manual review for business logic flaws
  • Use scan results to improve tests: add unit/integration tests for auth flows

Example use cases

  • Audit a login/signup implementation to identify missing CSRF or weak validations
  • Scan a project for hardcoded credentials or exposed API keys in auth modules
  • Validate session management and cookie flags across an application
  • Check JWT creation/verification code for common vulnerabilities
  • Integrate into CI to block merges that introduce new auth issues

FAQ

What inputs does the scanner need?

Point it at source paths or specific files containing auth logic; it supports directory and file scanning modes.

Does it fix issues automatically?

No. The tool reports findings and remediation suggestions; developers apply fixes and re-scan.