1. 4
  1.  

  2. 3

    Technical details at the end. They’re alarming. I occasionally write or work with authentication code. The biggest fear I have is introducing a bug that allows auth bypass. Then I read stories like this about bugs it never occurred to me you could even have. I mean, why can site A users login to site B and get site A credentials? Somebody went out of their way to make this happen.