Travel-hacking-toolkit american-airlines
Check American Airlines AAdvantage balance, elite status, and loyalty points via Patchright. Handles email 2FA with 6-box code entry. Uses persistent browser profiles to skip 2FA on subsequent runs.
git clone https://github.com/borski/travel-hacking-toolkit
T=$(mktemp -d) && git clone --depth=1 https://github.com/borski/travel-hacking-toolkit "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/american-airlines" ~/.claude/skills/borski-travel-hacking-toolkit-american-airlines && rm -rf "$T"
skills/american-airlines/SKILL.mdAmerican Airlines AAdvantage
Check AAdvantage award miles balance, elite status (Gold/Platinum/Platinum Pro/Executive Platinum), loyalty points, and million miler status. Uses Patchright (undetected Playwright fork) because AA blocks standard browser automation.
Requires Patchright. AA.com blocks vanilla Playwright and agent-browser.
Prerequisites
pip install patchright && patchright install chromium
Or use Docker (no local install needed):
docker pull ghcr.io/borski/aa-miles-check:latest # or build locally: docker build -t aa-check skills/american-airlines/
Usage
Pass credentials via environment variables or flags. If you use a secrets manager (1Password, Vault, etc.), inject them however you normally would.
# Environment variables AA_USERNAME=your_aa_number AA_PASSWORD=your_password \ python3 scripts/check_balance.py --json # Flags python3 scripts/check_balance.py --username YOUR_AA_NUMBER --password YOUR_PASSWORD --json # Docker docker run --rm -e AA_USERNAME=your_aa_number -e AA_PASSWORD=your_password aa-check --json
2FA Handling
AA requires email verification on first login from a new device. The script waits up to 120 seconds for the code.
You (the agent) do NOT have access to the user's email. AA sends the 2FA code to the account holder's email address. When the script hits 2FA, you MUST ask the user for the 6-digit code. This is not optional. Do not try to read their email. Do not guess. Do not skip. Ask them, wait for the answer, then write it to the code file.
Agent workflow
- Run the script in the background (
,nohup ... &
)disown - Poll stderr for
to confirm the code was sent"2FA REQUIRED" - Ask the user for the 6-digit code AA emailed them
- Write the code to the code file:
echo "123456" > /tmp/aa-2fa-code.txt - Wait for the script to complete and read stdout for the JSON result
Persistent profiles (skip 2FA on repeat runs)
Use
--profile name to save browser cookies. After the first successful 2FA, subsequent runs with the same profile skip 2FA entirely. Profiles are stored at ~/.aa-browser-profiles/{name}/. Sessions last hours, not days.
# First run: will need 2FA python3 scripts/check_balance.py --profile user1 --json # Later runs: same profile, no 2FA python3 scripts/check_balance.py --profile user1 --json
Code input methods
- Command hook: Set
to a command that blocks until it has the code, then prints it to stdout. The script runs this first before falling back to file polling.AA_2FA_COMMAND - File (default): Script polls
every 2 seconds. Write the 6-digit code there./tmp/aa-2fa-code.txt - Direct flag:
if you already have the code before running.--code 123456 - Custom file path:
--code-file /path/to/code.txt
Output
{ "username": "XXXXXXX", "status": "completed", "miles": 123425, "elite_status": "Platinum Pro", "loyalty_points": 180, "name": "John Doe", "aadvantage_number": "XXXXXXX", "million_miler": 19328, "member_since": "Aug 23, 2011" }
| Field | Description |
|---|---|
| Award miles balance (redeemable) |
| Gold, Platinum, Platinum Pro, or Executive Platinum (null if none) |
| Current year loyalty points (reset March 1) |
| Lifetime miles toward Million Miler status |
| Account creation date |
When to Use
- Checking AA miles balance (AwardWallet doesn't support AA)
- Verifying elite status tier and expiration
- Tracking loyalty points toward next status level
- Comparing AA award availability against balance (combine with seats-aero)
When NOT to Use
- Booking flights. Read-only. Does not modify anything.
- Other airlines. Use AwardWallet for airlines it supports.
Implementation Notes
- AA uses 6 separate input boxes for 2FA codes (one digit per box). The script types each digit individually with auto-advance.
- Cookie consent banners are removed via JS before interacting with the Verify button.
- The Verify button requires Tab+Enter to submit (neither JS
nor Playwright.click()
produce a trusted pointer event that AA's React app accepts)..click()
is required. AA detects headless browsers even with Patchright. Docker uses xvfb for a virtual display.headless=False
Limitations
- 2FA on first use per profile. No way around it. AA sends an email code. Set
to automate code retrieval.AA_2FA_COMMAND - Session expiry. Persistent profiles last hours, not days. Long gaps between runs may require 2FA again.
- Headed mode required. Opens a Chrome window locally. Use Docker for no popup.