OAuth
v1.0.0Implement OAuth 2.0 and OpenID Connect flows securely.
⭐ 2· 1.2k·8 current·9 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md content: a concise set of secure OAuth2/OIDC implementation recommendations. The skill requests no unrelated binaries, env vars, or config paths, which is appropriate for a documentation-style guidance skill.
Instruction Scope
SKILL.md contains only implementation guidance (flows, PKCE, state, redirect validation, token handling, etc.). It does not instruct the agent to read files, access environment variables, call external endpoints, or transmit data. Scope stays within describing secure OAuth/OIDC practices.
Install Mechanism
No install spec and no code files (instruction-only). This is lowest-risk: nothing is written to disk and no external packages are fetched.
Credentials
The skill declares no required environment variables or credentials. The doc discusses tokens and client secrets conceptually (which is expected) but does not request those secrets from the environment.
Persistence & Privilege
always is false and the skill has no install steps or persistent components. It does not attempt to modify other skills or system-wide configuration.
Assessment
This skill is documentation only and appears coherent and low-risk. It will not run code or ask for secrets by itself. If you use these recommendations to implement OAuth/OIDC in your application, ensure you: (1) use well-maintained OAuth libraries rather than copying ad-hoc code; (2) keep client_secrets and tokens out of client-side code and out of version control; (3) follow the checklist items (PKCE for public clients, exact redirect URIs, HTTPS, short-lived tokens, token revocation); and (4) review any code that implements these flows for secure handling/storage/transmission of credentials. If you plan to let an agent perform deployments or configure servers automatically, verify the agent's runtime environment and credential access separately — this skill itself does not request or manage secrets.Like a lobster shell, security has layers — review code before you run it.
latestvk977acfvbvrm18rm1xtdhezn6x80wvth
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔑 Clawdis
OSLinux · macOS · Windows
