Configures server-side session synchronization via secure HTTP-only cookies for SSR frameworks.
94
94%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
getSession() as the sole authentication check on the server. It does NOT verify the JWT. MUST use getUser() for all server-side auth validation.httpOnly: false on auth cookies. Token leakage to client JavaScript is a security breach.access_token to cookies without simultaneously writing refresh_token. Both MUST be written atomically.sameSite: 'none' without explicit cross-origin deployment justification. HALT and request confirmation if encountered.pkce-auth-flow tile is not deployed.createServerClient from @supabase/ssr -- NEVER use createClient from @supabase/supabase-js on server paths.httpOnly: true, secure: true, sameSite: 'lax', path: '/'.getUser() in middleware on every request and propagate refreshed cookies in the response.@supabase/ssr version is >=0.5.0 before proceeding.