EN-C022-043-auth-monitoring-device-code-phishing-fuse
[EN-C022-043] Auth Monitoring: Device Code Phishing Fuse
Overview
This pattern detects and contains OAuth Device Code phishing (abuse of legitimate verification flows) by correlating identity, network, and token-usage telemetry in near real time.
Use Case
- Same user approves multiple device codes across distant regions within minutes.
- User-agent, ASN, or device posture diverges from baseline.
- Token/API activity spikes immediately after approval.
OpenClaw Implementation Steps
- Enable config
- Turn on
cron,sessions_spawn, andmessageintegrations. - Schedule 1–5 minute polling jobs for auth telemetry.
- Turn on
- Acquire APIs
- Generate IdP audit API credentials (OIDC provider).
- Add reverse-proxy or zero-trust event API tokens.
- Operational setup
- Ingest approval and token events via
cron. - Use split roles: detection agent + verifier sub-agent (
sessions_spawn). - On high risk, launch user challenge and temporary token freeze via
sessions_send.
- Ingest approval and token events via
Trend Signals (GitHub/Reddit + V2EX/GitHub CN)
- English communities: strong growth in detection rules for “legitimate flow abuse.”
- Chinese communities: increasing focus on approval-log correlation in enterprise zero-trust rollouts.
Practical Example Links
- X: In preparation
- note: In preparation
- GitHub: https://github.com/topics/oidc
- Moltbook: In preparation
Registry ID: EN-043 | Status: Draft-Verified | Language: English