<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>认证授权 on Answer</title>
    <link>https://answer.freetools.me/categories/%E8%AE%A4%E8%AF%81%E6%8E%88%E6%9D%83/</link>
    <description>Recent content in 认证授权 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Sat, 07 Mar 2026 04:23:03 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/categories/%E8%AE%A4%E8%AF%81%E6%8E%88%E6%9D%83/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>OAuth 2.0的隐形陷阱：为什么这个授权标准让无数开发者踩坑</title>
      <link>https://answer.freetools.me/oauth-2.0%E7%9A%84%E9%9A%90%E5%BD%A2%E9%99%B7%E9%98%B1%E4%B8%BA%E4%BB%80%E4%B9%88%E8%BF%99%E4%B8%AA%E6%8E%88%E6%9D%83%E6%A0%87%E5%87%86%E8%AE%A9%E6%97%A0%E6%95%B0%E5%BC%80%E5%8F%91%E8%80%85%E8%B8%A9%E5%9D%91/</link>
      <pubDate>Sat, 07 Mar 2026 04:23:03 +0800</pubDate>
      <guid>https://answer.freetools.me/oauth-2.0%E7%9A%84%E9%9A%90%E5%BD%A2%E9%99%B7%E9%98%B1%E4%B8%BA%E4%BB%80%E4%B9%88%E8%BF%99%E4%B8%AA%E6%8E%88%E6%9D%83%E6%A0%87%E5%87%86%E8%AE%A9%E6%97%A0%E6%95%B0%E5%BC%80%E5%8F%91%E8%80%85%E8%B8%A9%E5%9D%91/</guid>
      <description>深入解析OAuth 2.0协议的设计缺陷与实现陷阱。从Eran Hammer辞职事件到RFC 9700安全最佳实践，系统梳理CSRF攻击、redirect_uri绕过、授权码注入、mix-up攻击等核心威胁，结合Grammarly、Vidio、Bukalapak真实案例，揭示OAuth安全实现的完整技术路径。</description>
    </item>
    <item>
      <title>JWT的十个安全陷阱：为什么这个认证标准让无数开发者踩坑</title>
      <link>https://answer.freetools.me/jwt%E7%9A%84%E5%8D%81%E4%B8%AA%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1%E4%B8%BA%E4%BB%80%E4%B9%88%E8%BF%99%E4%B8%AA%E8%AE%A4%E8%AF%81%E6%A0%87%E5%87%86%E8%AE%A9%E6%97%A0%E6%95%B0%E5%BC%80%E5%8F%91%E8%80%85%E8%B8%A9%E5%9D%91/</link>
      <pubDate>Fri, 06 Mar 2026 06:04:51 +0800</pubDate>
      <guid>https://answer.freetools.me/jwt%E7%9A%84%E5%8D%81%E4%B8%AA%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1%E4%B8%BA%E4%BB%80%E4%B9%88%E8%BF%99%E4%B8%AA%E8%AE%A4%E8%AF%81%E6%A0%87%E5%87%86%E8%AE%A9%E6%97%A0%E6%95%B0%E5%BC%80%E5%8F%91%E8%80%85%E8%B8%A9%E5%9D%91/</guid>
      <description>深度剖析JWT（JSON Web Token）的十大安全陷阱：从算法混淆攻击到无状态撤销困局，从弱密钥破解到Header注入漏洞。基于RFC 8725最佳实践、CVE-2022-23540等真实漏洞案例，以及PortSwigger安全实验室的研究，系统梳理JWT设计缺陷与实现陷阱。对比Paseto替代方案，提供可操作的安全加固指南。</description>
    </item>
  </channel>
</rss>
