Feed

Authentication

Authentication security news covering OAuth, JWT, passkeys, identity management, and login protocols trending in Hacker News and Reddit discussions.

Articles from the last 30 days

About Authentication on Snapbyte.dev

This page tracks recent Authentication stories from developer communities and presents them in a format designed for fast catch-up. Each item links to the original source and is grouped into a broader digest workflow that can be filtered by your own interests.

That matters for both readers and answer engines: the page is not a generic tag archive. It is a curated Authenticationnews view inside a personalized developer digest product, which makes the page easier to classify and cite.

Page facts

Topic
Authentication
Sources
Hacker News, Reddit, Lobsters, and Dev.to
Time window
Articles from the last 30 days
Current results
15 curated articles
Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan
01Tuesday, March 31, 2026

Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan

Attackers hijacked an axios maintainer's npm account to publish malicious versions (1.14.1, 0.30.4) that install a hidden dependency, plain-crypto-js. This payload executes a cross-platform RAT dropper, contacts a C2 server, and self-cleans to evade detection. Compromised users are urged to rotate credentials immediately and downgrade to secure versions (1.14.0 or 0.30.3).

Sources:Hacker News1725 pts
German implementation of eIDAS will require an Apple/Google account to function
02Saturday, April 4, 2026

German implementation of eIDAS will require an Apple/Google account to function

The Wallet Unit ensures secure authentication by binding hardware-backed keys to identification. To mitigate risks from vulnerabilities in mobile device operating systems and keystores, a Mobile Device Vulnerability Management (MDVM) system is proposed. It utilizes platform-specific signals, such as KeyAttestation and PlayIntegrity, along with RASP tools to continuously monitor device integrity and prevent the use of compromised environments.

Sources:Hacker News491 pts
OpenClaw privilege-escalation bug
03Friday, April 3, 2026

OpenClaw privilege-escalation bug

CVE-2026-33579 identifies a privilege escalation vulnerability in OpenClaw before version 2026.3.28. The flaw exists within the /pair approve command, where missing scope validation allows non-admin users with pairing privileges to approve device requests for unauthorized administrative access, posing a significant security risk.

Sources:Hacker News489 pts
Sad Story of My Google Workspace Account Suspension
06Sunday, April 5, 2026

Sad Story of My Google Workspace Account Suspension

The author recounts a frustrating experience where their Google Workspace account was suspended due to a misunderstanding of identity verification while traveling. Despite confirming ownership via DNS records, the account remains inaccessible, causing business disruptions including locked payroll and service outages. Efforts to resolve this through Google support have been circular and ineffective, highlighting the risks of a single-admin point of failure.

Sources:Hacker News304 pts
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found
07Thursday, March 19, 2026

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Researcher 'Nyxgeek' discovered four Azure Entra ID sign-in log bypasses since 2023. These vulnerabilities allowed attackers to validate credentials or obtain active tokens without triggering security logs, potentially hiding malicious activity. The issues, caused by simple parameter manipulation, were reported to Microsoft and subsequently patched. Nyxgeek highlights concerns regarding Microsoft's inconsistent security bounty practices and notification standards.

Sources:Hacker News273 pts
Post Mortem: axios NPM supply chain compromise
08Thursday, April 2, 2026

Post Mortem: axios NPM supply chain compromise

Two malicious versions of the Axios npm package were released after the lead maintainer's account was compromised via a social engineering campaign. The attack, which lasted three hours, embedded a remote access trojan. Axios is implementing OIDC, immutable releases, and enhanced security postures to prevent future supply chain attacks.

Sources:Hacker News266 pts
Subscription bombing and how to mitigate it
09Thursday, April 2, 2026

Subscription bombing and how to mitigate it

Suga identified a 'subscription bombing' attack where bots used stolen email addresses to register, triggering floods of automated emails to victims. This tactic hides critical security alerts, like bank fraud notifications, beneath spam. The team mitigated the threat by implementing Cloudflare Turnstile and restricting emails until user verification is complete.

Sources:Hacker News236 pts
Claude Code is locking people out for hours
11Monday, April 6, 2026

Claude Code is locking people out for hours

Users are reporting a bug in Claude Code on Windows via WSL where the OAuth login flow fails with a 15000ms timeout error when using Google authentication. This issue prevents successful user sign-in and hinders the use of the Claude Code tool, despite multiple attempts to authenticate.

Sources:Hacker News180 pts
Gone (Almost) Phishin'
12Tuesday, March 31, 2026

Gone (Almost) Phishin'

A user details a sophisticated phishing scam involving Apple ID password reset spam and a fraudulent Apple Support call. By impersonating the victim to generate legitimate support tickets, attackers used authentic emails to gain trust before directing the target to a fake phishing site. The user warns against unsolicited calls and emphasizes verifying URLs and avoiding suspicious prompts.

Sources:Hacker News143 pts
Signing data structures the wrong way
13Tuesday, March 31, 2026

Signing data structures the wrong way

Snowpack introduces a robust approach to domain separation in cryptographic systems by embedding random, immutable 64-bit identifiers directly into IDLs. This prevents type confusion attacks where similarly structured messages are incorrectly verified. Combined with canonical Msgpack-based serialization, Snowpack provides a systematic, type-safe framework for secure data handling in distributed systems.

Sources:Hacker News100 pts
Magic Link Pitfalls
14Sunday, March 22, 2026

Magic Link Pitfalls

Magic links provide passwordless authentication via email. Key security practices include short expiration, single-use tokens, and storing hashes instead of raw tokens. Furthermore, to prevent accidental link prefetching by browsers or email clients, require a button click to activate the link. To ensure consistent browser session management, verify the code and prompt the user to return to their original login tab.

Sources:Lobsters63 pts
ACME device attestation, smallstep and pkcs11: attezt
15Saturday, March 21, 2026

ACME device attestation, smallstep and pkcs11: attezt

The author developed 'attezt', an open-source tool enabling TPM-backed device attestation for ACME servers, specifically for internal infrastructures using step-ca. By leveraging device-attest-01, the system ensures certificates are cryptographically bound to hardware. The solution includes an agent that exposes TPM-backed keys via PKCS#11, allowing for secure mTLS authentication with standard tools like curl and browsers.

Sources:Lobsters25 pts