Loading...
Loading...
API authentication and JWT abuse playbook. Use when testing bearer tokens, API keys, claim trust, header spoofing, rate limits, and API auth boundary weaknesses.
npx skill4agent add yaklang/hack-skills api-auth-and-jwt-abuseAI LOAD INSTRUCTION: Use this skill when APIs rely on JWT, bearer tokens, API keys, or weak request identity signals. Focus on token trust boundaries, claim misuse, header spoofing, and rate-limit bypass.
algkidjkux5u| Pattern | First Test |
|---|---|
| unsigned token with trailing dot |
| RS256 confusion | switch to HS256 using public key as secret |
| path traversal or injection in |
| remote key fetch trust | attacker-controlled |
| weak secret | offline crack with targeted wordlists |
role
isAdmin
admin
verified
plan
tier
permissions
org
ownerX-Forwarded-For: 1.2.3.4
X-Real-IP: 5.6.7.8
Forwarded: for=9.9.9.9X-Forwarded-For
X-Real-IP
Forwarded
User-Agent rotation
Path case / slash variants