Auth0 Nextjs

AdvisoryAudited by Static analysis on May 6, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using this setup can create or select an Auth0 application and configure credentials that control authentication for the user's app.

Why it was flagged

The setup uses an Auth0 account session to list or create applications and writes Auth0 credential placeholders/configuration. This is expected for an Auth0 integration, but it is account-level authority the user should understand.

Skill content
auth0 login ... auth0 apps create ... AUTH0_CLIENT_ID=$AUTH0_CLIENT_ID ... AUTH0_CLIENT_SECRET='YOUR_CLIENT_SECRET'
Recommendation

Use the intended Auth0 tenant, review callback/logout URLs, keep env files out of version control, and avoid sharing client secrets.

What this means

Running the automated setup can modify the local development environment by installing the Auth0 CLI.

Why it was flagged

The optional automated setup downloads and runs an Auth0 CLI installer. This is disclosed and purpose-aligned, but it executes remote installer code and installs a local binary.

Skill content
curl -sSfL https://raw.githubusercontent.com/auth0/auth0-cli/main/install.sh -o /tmp/auth0-install.sh ... sh /tmp/auth0-install.sh -b /usr/local/bin
Recommendation

Prefer official package-manager installation where possible, inspect the installer before running it, and use the manual setup path if you do not want remote installer execution.

What this means

If approved, the setup can change environment configuration used by the Next.js app and may create duplicate or unintended Auth0 settings.

Why it was flagged

The automated setup can append Auth0 variables to .env.local or .env. It includes explicit confirmation and no-read safeguards, but it still mutates sensitive local configuration.

Skill content
Before running any part of this setup that writes to an env file, you MUST ask the user for explicit confirmation ... cat >> "$TARGET_FILE" << ENVEOF
Recommendation

Confirm the target env file, back it up if needed, verify the added values, and ensure the file is listed in .gitignore.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

A misconfigured matcher or callback URL could lock users out, leave pages unprotected, or break application routes.

Why it was flagged

The recommended middleware/proxy pattern applies broadly across the app and creates authentication endpoints. That is normal for Auth0 setup, but mistakes can affect routing and access control across many pages.

Skill content
matcher: [ '/((?!_next/static|_next/image|favicon.ico|sitemap.xml|robots.txt).*)' ] ... This automatically creates endpoints: /auth/login ... /auth/profile
Recommendation

Test in development or staging, verify which routes are public versus protected, and review middleware behavior before production deployment.