browser-auth-flow
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseBrowser Auth Flow
Browser Auth Flow
Adversarial probe of a site's authentication. Drives the login flow once, records the trajectory, then runs a configurable set of probes against the captured artifacts and live page. Output is a structured inside the RVF container.
findings.md对网站认证流程进行对抗性探测。先执行一次登录流程并记录轨迹,然后针对捕获的信息和实时页面运行一组可配置的探测。输出内容为RVF容器内的结构化文档。
findings.mdWhen to use
适用场景
- Pre-deployment audit of a new auth flow.
- Investigating a suspected token leak or redirect issue.
- Establishing a baseline for ongoing regression checks.
- 新认证流程部署前的审计。
- 调查疑似的令牌泄露或重定向问题。
- 为持续回归检查建立基准。
Steps
步骤
-
Open a recorded session via.
browser-record -
Drive the auth flow as in(credentials come from
browser-loginreferencing--credentials <handle>if the run is a re-auth probe).browser-cookies -
Run probes:
- : inspect the login POST in the trajectory; verify a same-origin token field is present and non-empty.
csrf - : watch
redirectafter each nav for cross-origin redirects with auth state in the URL or fragment. Flag any token-bearing URL that crosses an origin boundary.browser_get-url - : walk
cookieviadocument.cookie. For each cookie, checkbrowser_eval,Secure,HttpOnly, expiry, and entropy of the value. Flag missing flags or short tokens. Pass each throughSameSiteto flag PII embedded in cookie values.aidefence_scan - : if the flow involves a third-party provider, capture the authorization request, verify
oauthandstateare present and high-entropy, verifynoncematches the registered callback domain.redirect_uri
-
Quarantine any token / credential / PII captured during probing — it stays inside the RVF container's findings, never returns to the model unredacted (gate from
aidefence_is_safeapplies if you read the findings back).browser-extract -
Writewith one section per probe, severity rating per finding, and a
findings.md(pass / warn / fail).verdict -
Index the session inwith
browser-sessionsso future audits compare against it.tag: auth-probe
-
通过打开已录制的会话。
browser-record -
按照的方式执行认证流程(如果是重新认证探测,凭据来自
browser-login,引用--credentials <handle>)。browser-cookies -
运行探测:
- :检查轨迹中的登录POST请求;验证是否存在同源令牌字段且非空。
csrf - :在每次导航后通过
redirect监控包含认证状态的跨源重定向(URL或片段中)。标记任何跨越源边界且携带令牌的URL。browser_get-url - :通过
cookie遍历browser_eval。针对每个Cookie,检查document.cookie、Secure、HttpOnly属性、过期时间以及值的熵值。标记缺失必要属性或令牌过短的情况。将每个Cookie传入SameSite,标记嵌入在Cookie值中的PII。aidefence_scan - :如果流程涉及第三方提供商,捕获授权请求,验证
oauth和state是否存在且具有高熵值,验证nonce是否与注册的回调域名匹配。redirect_uri
-
隔离探测过程中捕获的任何令牌/凭据/PII——它们仅保留在RVF容器的结果中,绝不会以未编辑的形式返回给模型(如果您读取结果,中的
browser-extract网关会生效)。aidefence_is_safe -
生成:每个探测对应一个章节,每个结果包含严重性评级,以及一个
findings.md(通过/警告/失败)。verdict -
在中索引会话,添加
browser-sessions,以便未来审计时进行对比。tag: auth-probe
Caveats
注意事项
- This skill probes; it does not exploit. Do not chain follow-up requests using a captured token.
- Credentials must come from a vaulted handle or interactive entry. Never hardcode them in the field map.
- Some probes require multiple page loads. Trajectory step count for an auth probe typically lands at 15–40 steps; budget accordingly.
- The output is structured for human review. Do not auto-act on findings without surfacing them to the user first.
- 本技能仅用于探测,不用于攻击。请勿使用捕获的令牌发起后续请求。
- 凭据必须来自加密存储的句柄或交互式输入。切勿在字段映射中硬编码凭据。
- 部分探测需要多次页面加载。认证探测的轨迹步骤数通常在15–40步之间,请合理分配资源。
- 输出内容为结构化格式,供人工审核。在未将结果展示给用户之前,请勿自动根据结果执行操作。