Feature request for Supabase Auth: Automatically invalidate OTP after multiple failed login attempts #33745
Unanswered
maximilian-hammerl
asked this question in
Feature Requests
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Currently, Supabase Auth allows users to request OTPs for authentication, but these OTPs remain valid even after multiple failed login attempts. This can be exploited by attackers trying to gain unauthorized access through brute force guessing.
Proposed feature:
Introduce a security mechanism that automatically invalidates an OTP if a user has attempted to log in with that OTP unsuccessfully X times. Once the limit is reached, the OTP should be invalidated, requiring the user to request a new one.
Use case:
Suggested implementation:
Impact:
This feature would enhance Supabase Auth’s security against unauthorized login attempts, reducing the risk of successful OTP brute-force attacks.
Beta Was this translation helpful? Give feedback.
All reactions