
No secret vault means no jackpot breach event.
Security is strongest when the browser never handles confidential exchange secrets and backend services treat identity tokens as verifiable artifacts, not implicit trust signals.
ZKAuth security posture is tied to a concrete OAuth implementation contract: strict authorize inputs, backend token exchange, and deterministic JWT validation.

Security is strongest when the browser never handles confidential exchange secrets and backend services treat identity tokens as verifiable artifacts, not implicit trust signals.
Exact redirect URI matching and strict state validation reduce callback manipulation and CSRF-style auth hijack risk.
Backend-only token exchange prevents client secrets from being exposed in browser code or intercepted frontend traffic.
RS256 verification against JWKS and claim checks (`iss`, `aud`, `exp`) mitigates acceptance of invalid tokens.
Using `sub` as the stable local anchor mitigates user-account mismatch caused by optional or changing profile claims.
Security documentation should be transparent without promising unsupported behavior. Keep the split strict: