Skip to main content Link Search Menu Expand Document Warning Info Success Info (external link) Copy Copied Following system colour scheme Selected dark colour scheme Selected light colour scheme Telegram GitHub Edit

User → Browser/App → https://lite.facebook.com/login?auth_token=XYZ → Facebook Lite Server validates token → Sets session cookies → Redirects to next URL | Issue | Mitigation | |-------|------------| | Token leakage (e.g., via logs) | Use HTTPS, keep token lifetime ≤ 5 min, generate per‑session. | | Phishing (malicious link mimicking Facebook) | Verify Host header ( lite.facebook.com ) and use HSTS. | | Replay attacks | Tokens are single‑use; server marks them consumed. | | Cross‑site scripting | Encode next parameter; whitelist allowed domains. | | Device theft | Session cookies are bound to device fingerprint; require re‑auth after inactivity. | 5. Implementation Example (Python) import requests import urllib.parse

APP_ID = 'YOUR_APP_ID' APP_SECRET = 'YOUR_APP_SECRET' REDIRECT_URI = 'https://lite.facebook.com/home'

def generate_login_link(): # Step 1: obtain short‑lived token token_resp = requests.get( 'https://graph.facebook.com/v20.0/oauth/access_token', params= 'client_id': APP_ID, 'client_secret': APP_SECRET, 'grant_type': 'client_credentials' ) token = token_resp.json()['access_token']