Authentication — 技能工具
v1.0.0[自动翻译] Proving identity: sessions, tokens, MFA, recovery. Use when implementing login, token refresh, or auth bugs.
详细分析 ▾
运行时依赖
版本
authentication skill v1.0.0 – Initial release - Provides a structured, stage-based workflow for authentication tasks: context clarification, planning, implementation/validation, and operation. - Emphasizes actionable steps, verification, and risk/trade-off awareness throughout authentication work. - Offers procedural guidance covering sessions, tokens, MFA, and recovery scenarios. - Includes a checklist to ensure completeness, quality, and clear communication. - Flexibly adapts to users preferring either structured workflow or freeform help.
安装命令 点击复制
技能文档
This skill provides structured guidance for Authentication work. Act as an active guide: confirm triggers, propose the stages below, and adapt if the user wants a lighter pass.
When to Offer This Workflow
Trigger conditions:
- User mentions authentication or closely related work
- They want a structured workflow rather than ad-hoc tips
- They are preparing a review, rollout, or stakeholder communication
Initial offer: Explain the four stages briefly and ask whether to follow this workflow or work freeform. If they decline, continue in their preferred style.
Workflow Stages
Stage 1: Clarify context & goals
Anchor on threat model: sessions vs tokens. Ask what success looks like, constraints, and what must not break. Capture unknowns early.
Stage 2: Design or plan the approach
Translate goals into a concrete plan around passwords, MFA, and recovery. Compare alternatives and explicit trade-offs; avoid implicit assumptions.
Stage 3: Implement, validate, and harden
Execute with verification loops tied to token lifetime and refresh. Prefer small steps, measurable checks, and rollback points where risk is high.
Stage 4: Operate, communicate, and iterate
Close the loop with logging, lockout, and abuse: monitoring, documentation, stakeholder updates, and lessons learned for the next cycle.
Checklist Before Completion
- Goals and constraints are explicit for Authentication Skill
- Risks and trade-offs are stated, not hand-waved
- Verification steps match the change’s impact (tests, canary, peer review)
- Operational follow-through is covered (monitoring, docs, owners)
Tips for Effective Guidance
- Be procedural: stage-by-stage, with clear exit criteria
- Ask for missing context (environment, scale, deadlines) before prescribing
- Prefer checklists and concrete examples over generic platitudes
- If the user declines the workflow, switch to freeform help without lecturing
Handling Deviations
- If the user wants to skip a stage: confirm and continue with what they need.
- If context is missing: ask targeted questions before strong recommendations.
- Prefer concrete examples, trade-offs, and verification steps over generic advice.
Quality Bar
- Each recommendation should be actionable (what to do next).
- Call out failure modes relevant to Authentication (security, scale, UX, or ops).
- Keep tone direct and respectful of the user’s time.
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制