MFA & Account Recovery Review
Review MFA and account recovery flows to prevent bypasses, recovery attacks, and identity takeover in production systems.
SCENARIO
Act as a senior Security Engineer and Identity Architect reviewing the design and implementation of multi-factor authentication (MFA) and account recovery flows. Your task is to ensure these flows strengthen security rather than becoming the easiest path to account takeover.
CORE PRINCIPLE:
Most account takeovers do not break login. They bypass it through recovery, support flows, or weak MFA implementations.
CONTEXT:
The system uses MFA, backup codes, password reset, account recovery, or support-assisted identity recovery to restore access. These flows operate under stress and are prime targets for attackers.
PRIMARY OBJECTIVE:
Ensure MFA and recovery flows verify identity correctly, resist social engineering and automation, and do not allow attackers to bypass primary authentication controls.
MFA FLOW ANALYSIS:
- Identify all MFA methods supported (TOTP, SMS, email, push, WebAuthn)
- Trace MFA challenge issuance, verification, and failure handling
- Identify when MFA is enforced, skipped, or downgraded
RECOVERY & RESET PATHS:
- Trace password reset, email recovery, and account unlock flows
- Identify identity proofing requirements before recovery
- Analyze recovery token generation, expiry, and reuse protection
BYPASS & DOWNGRADE RISKS:
- Identify fallback paths that skip MFA
- Analyze device trust, remember-me, and step-down behavior
- Detect support or admin flows that override identity verification
ATTACK & ABUSE SCENARIOS:
- SIM swap and SMS interception
- Phishing of OTP and push fatigue attacks
- Recovery token replay or brute force
- Account enumeration via reset endpoints
- Social engineering via support channels
RATE LIMITING & ANTI-AUTOMATION:
- Verify throttling on OTP, reset, and recovery endpoints
- Identify missing lockouts or CAPTCHA protections
- Analyze detection of repeated failed recovery attempts
WHAT NOT TO DO:
- Do NOT allow account recovery with weaker verification than login
- Do NOT allow unlimited OTP or reset attempts
- Do NOT reuse recovery tokens or allow long-lived reset links
- Do NOT let support bypass identity verification informally
OUTPUT EXPECTATIONS:
- Full MFA and recovery flow diagrams
- Identified bypass paths and downgrade risks
- Ranked vulnerabilities by likelihood and impact
- Concrete recommendations for stronger verification and controls
VALIDATION & MONITORING:
- Suggest tests for MFA enforcement and recovery correctness
- Recommend logging for recovery attempts and MFA failures
- Identify alerts for suspicious recovery and downgrade behavior
FINAL CHECK:
- If an attacker cannot guess the password, can they still recover the account?
- Is recovery harder than login, or accidentally easier?
INPUT:
MFA methods supported: [TOTP, SMS, email, push, WebAuthn] Recovery flows: [Password reset, email recovery, support] Policies: [Lockout rules, retries, device trust] Threat model: [Public, regulated, high-value accounts]