| ▲ | jallmann 5 hours ago | |||||||||||||
> OAuth with refresh tokens. Then the LLM slurps up your refresh token. What's next? | ||||||||||||||
| ▲ | kittoes 5 hours ago | parent | next [-] | |||||||||||||
Is that really a concern though in the same way API keys are? Since when do OAuth clients store refresh tokens in areas that LLMs regularly scan? API keys are truly passwords, while refresh tokens are exchanged for a password. Sure, a leak would be bad but I'd argue that it's orders of magnitude less likely compared to the accepted norm. | ||||||||||||||
| ||||||||||||||
| ▲ | jpalawaga 2 hours ago | parent | prev | next [-] | |||||||||||||
depends on the grant type and what scenario we're talking about. things change if we're talking about 3-legged oauth or client-device oauth. for example, in an authorization code flow, the refresh token is useless without the client id/secret. more providers are making refresh-tokens single shot. this means that if someone refreshes your token for you, your own auth will break as you will not be eligible to refresh the token, at which point you could reconnect the app and void the old (stolen) session. time-limiting and single-purposing the tokens are not cure-alls, but they do certainly offer enhanced security by limiting the amount and scope of damage. | ||||||||||||||
| ▲ | 5 hours ago | parent | prev [-] | |||||||||||||
| [deleted] | ||||||||||||||