SiteShadow
Back to vulnerability library

TOK01 Long-Lived Token Use

What this means

SiteShadow flagged tokens/sessions configured with overly long lifetimes (or no expiry), which increases the impact of leaks and account compromise.

Why it matters

Long-lived tokens increase exposure window for compromise.

Safer examples

1) Use short-lived access tokens + refresh rotation

2) Bind tokens to context when possible

Device/session binding and token audience/issuer checks reduce token replay.

3) Provide revocation and rotation mechanisms

Admins/users should be able to revoke sessions/API keys immediately.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage