multi-system-sso-authentication

Warn

Audited by Socket on Feb 18, 2026

1 alert found:

Anomaly
AnomalyLOW
SKILL.md

The merged assessment indicates a broadly plausible design for a multi-provider enterprise SSO with RS256 JWT validation, backwards verification, and Redis-backed sessions. However, multiple high-risk touchpoints exist: mixed claim verification patterns, reliance on self-issued tokens routing, partial Laravel decryption logic, and sensitive key material on disk. To move toward production readiness, implement consistent claim verification (prefer enabling verify_iss/verify_aud in JOSE with trusted configuration), solidify backwards-verification caching semantics with revocation awareness, enforce end-to-end TLS and strict secret management (including rotation and access control), and fully implement or safely remove the Laravel session decryption path. Overall risk remains moderate; the design is not inherently malicious but requires rigorous hardening and explicit operational controls to be considered safe for production.

Confidence: 57%Severity: 58%
Audit Metadata
Analyzed At
Feb 18, 2026, 04:11 AM
Package URL
pkg:socket/skills-sh/rafaelkamimura%2Fclaude-tools%2Fmulti-system-sso-authentication%2F@b4ff3c6ced7cce1e166bf91d9583d3f0f0773403