Auth Best Practices
Password policies, login rate limiting, MFA/2FA, email verification, password reset expiry, logout everywhere, and critical action confirmation.
9 vulnerabilities
No Password Policy
mediumAccepting any password — including '123' or 'a' — makes your user accounts trivially vulnerable to credential stuffing and brute force attacks.
No Rate Limit on Login
mediumA login endpoint without rate limiting can be brute-forced thousands of times per second until a valid password is found.
No MFA/2FA
lowWithout multi-factor authentication, a stolen or guessed password is all it takes to fully compromise an account.
No Email Verification
mediumAllowing unverified email accounts lets attackers register with someone else's email address, potentially locking them out or impersonating them.
Password Reset Token Without Expiry
mediumPassword reset links that never expire stay valid indefinitely — an old email in a breach gives attackers a permanent account takeover path.
No Logout Everywhere
lowNot providing a 'log out all devices' option leaves sessions active on stolen or forgotten devices indefinitely.
No Login Notification
infoNot notifying users of new logins means they have no way to know if their account was accessed from an unfamiliar device.
No Password Strength Indicator
infoWithout real-time feedback on password strength, users default to weak passwords they already know — even when you require complexity.
No Confirmation for Critical Actions
mediumDestructive or irreversible actions (delete account, transfer funds, change email) without a confirmation step are vulnerable to CSRF and accidental clicks.