session-fixation-anti-pattern

Community

Prevent session hijacking.

Authorigbuend
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill addresses the critical security vulnerability of session fixation, where an attacker can hijack a user's authenticated session by predicting or stealing their session ID before they log in.

Core Features & Use Cases

  • Detects Session Reuse: Identifies instances where session IDs are not regenerated after authentication.
  • Provides Secure Examples: Offers clear "BAD" and "GOOD" code snippets demonstrating vulnerable and secure session management practices.
  • Use Case: When reviewing web application code, use this Skill to ensure that login mechanisms properly invalidate old session IDs and create new ones upon successful authentication, thereby preventing session hijacking.

Quick Start

Review the provided Python Flask code for session fixation vulnerabilities.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: session-fixation-anti-pattern
Download link: https://github.com/igbuend/grimbard/archive/main.zip#session-fixation-anti-pattern

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.