Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My apologies about "to know if your post-redirect-uri is getting spoofed" and then my example exploit; I was misremembering and forgetting the authorization-code step.

If you're only implementing a "client", then yeah, you can probably get away with never caring about inspecting the token. But if you're implementing a "resource server", then you'll need to, and it's all implementation-defined (but overwhelmingly that implementation is "it's a JWT").



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: