Awesome-openclaw-skills auth-checker
Audit authentication flows for security vulnerabilities
install
source · Clone the upstream repo
git clone https://github.com/sundial-org/awesome-openclaw-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/sundial-org/awesome-openclaw-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/auth-checker" ~/.claude/skills/sundial-org-awesome-openclaw-skills-auth-checker && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/sundial-org/awesome-openclaw-skills "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/auth-checker" ~/.openclaw/skills/sundial-org-awesome-openclaw-skills-auth-checker && rm -rf "$T"
manifest:
skills/auth-checker/SKILL.mdsource content
Auth Checker
Scan your auth implementation for security holes. Catches the stuff that gets you hacked.
Quick Start
npx ai-auth-check ./src/auth/
What It Does
- Audits login/signup flows for vulnerabilities
- Checks session management security
- Identifies weak password policies
- Flags insecure token handling
Usage Examples
# Audit auth directory npx ai-auth-check ./src/auth/ # Scan specific auth file npx ai-auth-check ./src/lib/auth.ts # Full project scan npx ai-auth-check ./src --recursive
What It Catches
- Hardcoded credentials
- Missing rate limiting
- Insecure session storage
- JWT vulnerabilities
- Missing CSRF protection
- Weak password validation
Requirements
Node.js 18+. OPENAI_API_KEY required.
License
MIT. Free forever.
Built by LXGIC Studios
- GitHub: github.com/lxgicstudios/ai-auth-check
- Twitter: @lxgicstudios