From harness
Use this skill whenever the user mentions login, signup, authentication, OAuth, session management, payments, subscriptions, billing, Stripe integration, or checkout flows. Also use when the user needs to protect routes, add role-based access, or implement payment webhooks. Do NOT load for: general UI components, database schema design, non-auth API endpoints, or business logic unrelated to auth/payments. Implements authentication and payment features using Clerk, Supabase Auth, or Stripe.
npx claudepluginhub tim-hub/powerball-harness --plugin harnessThis skill is limited to using the following tools:
A collection of skills responsible for implementing authentication and payment features.
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
A collection of skills responsible for implementing authentication and payment features.
| Feature | Details |
|---|---|
| Authentication | See references/authentication.md |
| Payments | See references/payments.md |
Authentication and payment features always carry high security risk. Always display the following before starting work:
๐ Security Checklist
This work is security-critical. Please verify the following:
### Authentication
- [ ] Passwords are hashed (bcrypt/argon2)
- [ ] Session management is secure (HTTPOnly Cookie)
- [ ] CSRF protection is implemented
- [ ] Rate limiting (brute-force protection)
### Payments
- [ ] Sensitive information (card numbers, etc.) is not stored on the server
- [ ] Stripe/payment provider SDK is used correctly
- [ ] Webhook signature verification
- [ ] Amount tampering prevention (amounts finalized server-side)
### Common
- [ ] Error messages are not too detailed (prevent information leakage)
- [ ] Sensitive information is not logged
โ ๏ธ Severity Level: ๐ด High
This feature carries the following risks:
- Credential leakage
- Unauthorized access
- Fraudulent payment operations
Expert review is recommended.
๐ Building Login & Payment Features Safely
1. **Hash passwords**
- Store passwords in an irreversible form
- Data remains safe even if it leaks
2. **Do not store card information on your server**
- Delegate to dedicated services like Stripe
- Store nothing on your own server
3. **Keep error messages vague**
- Use "Authentication failed" instead of "Wrong password"
- Do not give hints to malicious actors