> offensive-oauth
offensive-oauth skill from SnailSploit/Claude-Red
curl "https://skillshub.wtf/SnailSploit/Claude-Red/offensive-oauth?format=md"SKILL: OAuth Security Testing
Metadata
- Skill Name: oauth-attacks
- Folder: offensive-oauth
- Source: https://github.com/SnailSploit/offensive-checklist/blob/main/oauth.md
Description
OAuth 2.0 attack checklist: authorization code interception, redirect_uri bypass, CSRF on OAuth flow, state parameter abuse, open redirector chaining, token leakage via Referer, PKCE bypass, and scope escalation. Use when testing OAuth implementations in web apps or bug bounty.
Trigger Phrases
Use this skill when the conversation involves any of:
OAuth, OAuth 2.0, authorization code, redirect_uri bypass, OAuth CSRF, state parameter, PKCE bypass, scope escalation, token leakage, open redirector, OAuth attack
Instructions for Claude
When this skill is active:
- Load and apply the full methodology below as your operational checklist
- Follow steps in order unless the user specifies otherwise
- For each technique, consider applicability to the current target/context
- Track which checklist items have been completed
- Suggest next steps based on findings
Full Methodology
OAuth Security Testing
Shortcut
- Check for improper redirect validation (open redirects)
- Test state parameter manipulation/absence
- Manipulate OAuth flows to bypass authentication
- Try URL path traversal in redirect_uri
- Hunt for client secret leakage in source code/repos
- Look for improper scope validation
Mechanisms
- OAuth 2.0 authorizes limited access to resources via tokens; pair with OIDC for identity.
- Core Flows:
- Authorization Code (with PKCE for public clients)
- Client Credentials (service-to-service)
- Avoid Implicit and ROPC where possible
- Key Components:
- Resource Owner (user)
- Client (third-party app)
- Authorization Server (issues tokens)
- Resource Server (hosts protected resources)
- Tokens (access and refresh)
- Hardening Extensions:
- PAR (Pushed Authorization Requests), JAR (Request Objects), JARM (JWT-secured responses)
- Sender‑constrained tokens (DPoP, mTLS)
private_key_jwtor mTLS client authentication for confidential clients
OAuth/OIDC Considerations
- PKCE everywhere: Even with confidential clients/native apps;
code_verifiermust be required and validated. - Nonce/state binding: For OIDC, ensure
nonceis present and matched;stateshould be unguessable and tied to session. redirect_uriexact match: Enforce exact string match against pre-registered allowlist; no wildcards/path traversal.aud/azp/issenforcement: Validate tokens strictly, including clock skew and JWKSkidrotation behavior.- Front-channel logout/login CSRF: Validate logout CSRF; defend forced login to attacker accounts.
- ID Token vs Access Token: APIs must not accept ID tokens; check
token_typeand audience. - Device Code & CIBA: Validate polling rate limits, code expiry, and binding of device/user codes.
- Refresh Token Rotation: Enforce reuse detection and global invalidation chains.
- PAR/JAR/JARM: Use to pin exact redirect_uri and inputs and to protect front-channel parameters.
OAuth 2.1 Updates
- Implicit Flow Deprecated: Authorization servers should not support
response_type=token - Password Grant Deprecated: ROPC (Resource Owner Password Credentials) considered insecure
- PKCE Mandatory: Required for all OAuth clients including confidential clients
- Exact Redirect URI Matching: No more substring or prefix matching allowed
- Refresh Token Sender Constraint: Refresh tokens should be sender-constrained via DPoP or mTLS
Financial-grade API (FAPI) Security
FAPI 1.0 Advanced Profile
- Signed Request Objects (JAR): Authorization requests as signed JWTs
- Hybrid Flow: Uses
response_type=code id_tokenfor additional security - MTLS Client Authentication: Certificate-bound tokens
- JARM: JWT-secured authorization response mode
- Request Object Encryption: Sensitive parameters encrypted
FAPI 2.0 Security Profile
- Pushed Authorization Requests (PAR): POST request parameters to dedicated endpoint
- DPoP (Demonstrating Proof-of-Possession): Token bound to client's key pair
- Client Authentication:
private_key_jwtor MTLS required - Grant Management: Rich authorization requests and grant management API
graph TD
User[Resource Owner] -->|Initiates flow| Client
Client -->|Authorization Request| AuthServer[Authorization Server]
AuthServer -->|Authentication| User
User -->|Approves access| AuthServer
AuthServer -->|Authorization Code| Client
Client -->|Code + Client Secret| AuthServer
AuthServer -->|Access Token| Client
Client -->|Access Token| ResourceServer[Resource Server]
ResourceServer -->|Protected Resource| Client
style User fill:#b7b,stroke:#333,color:#333
style Client fill:#aae,stroke:#333,color:#333
style AuthServer fill:#9f9,stroke:#333,color:#333
style ResourceServer fill:#e9a,stroke:#333,color:#333
Hunt
- Intercept OAuth flows with proxy (Burp/ZAP)
- Manipulate redirect_uri parameters
- Remove/tamper state parameter
- Test PKCE implementations
- Inspect token handling in browsers
- Check for client secret leakage
- Analyze scope handling logic
- Test account linking/unlinking
- Review token validation procedures
- Examine refresh token security
Native/Mobile
- Verify App Links/Universal Links to prevent hijacking callbacks.
- Ensure OAuth proxy components in mobile apps validate issuer and JWKS; do not ship client secrets in binaries.
SPA/Browser
- Use Authorization Code + PKCE; avoid Implicit/Hybrid unless justified.
- Store tokens in memory; if cookies are used, set
__Host-prefix withHttpOnly; Secure; SameSite.
Authorization Code Flow
- Initial authorization request has
response_type=code - Request format:
/authorization?client_id=12345&redirect_uri=https://client-app.com/callback&response_type=code&scope=openid%20profile&state=ae13d489bd00e3c24 - Callback contains authorization code:
/callback?code=a1b2c3d4e5f6g7h8&state=ae13d489bd00e3c24 - More secure, backend exchanges code for tokens
sequenceDiagram
participant User
participant Client
participant AuthServer as Authorization Server
participant API as Resource Server
User->>Client: 1. Click "Login with Service"
Client->>AuthServer: 2. Authorization Request (response_type=code)
AuthServer->>User: 3. Login & Consent
User->>AuthServer: 4. Approves Access
AuthServer->>Client: 5. Redirect with Authorization Code
Client->>AuthServer: 6. Token Request (code + client_secret)
AuthServer->>Client: 7. Access & Refresh Tokens
Client->>API: 8. API Request + Access Token
API->>Client: 9. Protected Resource
Implicit Flow
- Initial authorization request has
response_type=token - Request format:
/authorization?client_id=12345&redirect_uri=https://client-app.com/callback&response_type=token&scope=openid%20profile&state=ae13d489bd00e3c24 - Access token returned directly in URL fragment:
/callback#access_token=z0y9x8w7v6u5&token_type=Bearer&expires_in=5000&scope=openid%20profile&state=ae13d489bd00e3c24 - Higher vulnerability potential due to frontend token handling
sequenceDiagram
participant User
participant Client as Client (Browser)
participant AuthServer as Authorization Server
participant API as Resource Server
User->>Client: 1. Click "Login with Service"
Client->>AuthServer: 2. Authorization Request (response_type=token)
AuthServer->>User: 3. Login & Consent
User->>AuthServer: 4. Approves Access
AuthServer->>Client: 5. Redirect with Access Token in Fragment
Note over Client: Token stored in browser
Client->>API: 6. API Request + Access Token
API->>Client: 7. Protected Resource
Vulnerabilities
- Improper redirect_uri validation
- Open redirects
- Subdomain/path validation bypass
- CSRF attacks (missing/improper state parameter)
- Token leakage (URL fragments in referrer headers)
- Scope elevation (improper authorization)
- Account takeover via improper linking/unlinking
- JWT vulnerabilities (weak signatures, lack of validation)
- Client secret exposure in source/git repositories
- Authorization bypass in misconfigured implementations
- Session fixation attacks
- Access token theft via XSS/Man-in-the-Middle
Authorization Code Injection / Code Substitution
- Attacker injects victim authorization code into attacker session to bind victim account. Mitigate with state-nonce binding and PKCE.
Method 1: Auth Bypass in OAuth Implicit Flow
- Locate POST request containing user info (email, username) and access token
- In implicit flow, servers often don't properly validate access tokens
- Try changing user parameters (email, username) while keeping the token
- Potentially impersonate other users if server trusts client-provided identifiers
Method 2: Forced Profile Linking
- Target OAuth profile linking functionality
- Check for missing
stateparameter in auth requests - Create CSRF attack by copying auth URL before code/token use
- Deliver as direct link or embedded iframe to victim
- Can link attacker's social media to victim's account
Method 3: Account Hijacking via redirect_uri
- Identify authorization request with redirect_uri parameter
- Test redirect_uri manipulation (external domains or open redirects)
- Modify redirect_uri to attacker-controlled endpoint (webhook)
- Deliver modified auth URL to victim to capture their authorization code
- Use stolen code to complete OAuth flow and access victim's account
Methodologies
- Tools:
- Burp Suite (OAuth Scanner extension)
- OWASP ZAP
- OAuth 2.0 Threat Model Toolkit
- Postman for API testing
- JWT_Tool for token analysis
- OAuthSecurity Cheatsheet Scanner
- Techniques:
- Flow manipulation
- Parameter tampering
- Token analysis
- Replay attacks
- Social engineering (phishing for tokens)
- DPoP proof validation testing
- MTLS certificate validation testing
- PAR endpoint exploitation
- Token exchange flow testing
Chaining and Escalation
OAuth → Full Account Takeover
-
Open Redirect → Authorization Code Theft:
- Discover open redirect on trusted domain
- Craft OAuth flow with redirect_uri pointing to open redirect
- Victim clicks malicious link, completes OAuth flow
- Authorization code redirected through open redirect to attacker
- Attacker exchanges code for access token
-
CSRF → Account Linking Attack:
- Initiate OAuth flow to link social account
- Capture authorization callback URL before code is used
- Deliver URL to victim via CSRF
- Victim's account linked to attacker's social account
- Attacker logs in with social account to access victim's account
-
XSS → Token Theft:
- Find XSS vulnerability on application
- Inject script to steal access tokens from localStorage
- Use stolen tokens to access victim's API resources
- If refresh tokens stolen, maintain persistent access
OAuth → Lateral Movement
-
Token Exchange → Service Impersonation:
- Obtain low-privilege access token
- Use RFC 8693 token exchange to request token for different service
- Weak validation allows unauthorized service access
- Move laterally across microservices
-
Scope Elevation → Privilege Escalation:
- Obtain token with limited scope
- Manipulate refresh token exchange to request broader scopes
- Weak scope validation grants elevated permissions
- Access privileged API endpoints
-
IdP Confusion → Cross-Tenant Access:
- Multi-tenant application with multiple IdPs
- Obtain authorization code from Tenant A's IdP
- Exchange code at Tenant B's token endpoint
- Weak issuer validation grants cross-tenant access
OAuth → Backend Exploitation
-
JWT Algorithm Confusion → Signature Bypass:
- Obtain valid JWT access token
- Change algorithm from RS256 to HS256
- Sign token with public key (treating it as HMAC secret)
- Backend fails to validate algorithm properly
- Forge arbitrary tokens for privilege escalation
-
SSRF via redirect_uri → Internal Service Access:
- OAuth provider allows internal redirect_uri
- Set redirect_uri to internal service (http://169.254.169.254)
- Authorization response sent to internal service
- Use to access cloud metadata or internal APIs
-
Token Replay → Session Hijacking:
- Capture access token via network sniffing or logs
- Token not properly bound to client (no DPoP/MTLS)
- Replay token from attacker's system
- Hijack victim's session and access resources
Remediation Recommendations
OAuth 2.1 / Modern Implementation
-
Implement OAuth 2.1: Adopt latest security recommendations
- Deprecate Implicit and Password grants
- Require PKCE for all clients (public and confidential)
- Enforce exact redirect_uri matching
- Implement refresh token rotation with reuse detection
-
Enforce state parameter: Always required, cryptographically random, single-use
-
Validate token claims strictly:
aud(audience): Must match resource serveriss(issuer): Verify against known issuersexp(expiration): Enforce with clock skew tolerance (max 60s)nbf(not before): Validate if present
-
Secure token storage:
- Never use localStorage (XSS vulnerable)
- Use httpOnly cookies with
__Host-prefix or memory-only storage - Set proper cookie flags:
HttpOnly; Secure; SameSite=Strict
Advanced Security Features
- Implement PAR (Pushed Authorization Requests): POST parameters to
/parendpoint - Use DPoP (Demonstrating Proof-of-Possession): Bind access tokens to client's public key
- Implement MTLS for confidential clients: Certificate-bound access tokens
- Use JAR (JWT-secured Authorization Request): Sign authorization request parameters
- Consider JARM (JWT-secured Authorization Response): Signed authorization responses
Token Management
- Short-lived access tokens: 5-15 minutes maximum
- Refresh token rotation: Issue new refresh token on each use
- Refresh token reuse detection: Revoke entire token family on reuse
- Token binding: Use DPoP or MTLS to bind tokens to clients
Standards and Compliance
- Follow OAuth 2.1 (draft) guidance
- Implement FAPI if dealing with financial data
- Follow RFC 6819 OAuth threat model
- Adopt RFC 8252 for native apps
- Consider RFC 8693 for secure token exchange
- Implement RFC 9449 for DPoP
Regular Security Practices
- Rotate signing keys regularly (every 6-12 months)
- Implement JWKS with short TTL (< 1 hour)
- Pin trusted issuers in client configuration
- Conduct regular OAuth security audits
- Keep libraries and dependencies updated
> related_skills --same-repo
> offensive-xxe
offensive-xxe skill from SnailSploit/Claude-Red
> offensive-xss
offensive-xss skill from SnailSploit/Claude-Red
> offensive-windows-mitigations
offensive-windows-mitigations skill from SnailSploit/Claude-Red
> offensive-windows-boundaries
offensive-windows-boundaries skill from SnailSploit/Claude-Red