Stop Testing "Login Pages": Security-Aware Auth Testing From Real Scenarios

11 Mar 2026
  • Locked
Viola Lykova's profile
Viola Lykova

Senior Software Engineer

Stop Testing "Login Pages": Security-Aware Auth Testing From Real Scenarios thumbnail
A free account is required to view this content
Talk Description

Viola Lykova’s talk argues that most teams are testing login pages the wrong way: by focusing on fields, buttons, and happy paths instead of the authentication journeys where users actually fail. Drawing on her experience as a software engineer working on reliability, observability, and authentication-related systems, she makes the case that login testing should be driven by real user pain points such as rate limiting, MFA failures, redirect loops, session expiry, and password reset dead ends. Her core message is that a small number of high-signal tests, chosen around the failures users genuinely encounter, are far more valuable than a large suite of green but low-value UI checks.

She then turns that principle into a practical strategy for testing authentication flows end to end. Rather than retesting third-party providers, Viola recommends testing what your team controls, mapping the critical journeys between unauthenticated, authenticated, expired, and revalidated states, and selecting one high-impact scenario per journey when time is limited. Through examples from Cypress-based tests, she shows how to validate generic error handling, rate limiting, and session expiry while keeping CI stable and avoiding flaky overcoverage. The talk is ultimately a call to treat authentication as a connected system, prioritise risk and user impact, and build leaner, smarter tests that catch the failures that matter most.

 

Viola Lykova
Senior Software Engineer

I'm a Senior Software Engineer and Cypress Ambassador. I build security-aware authentication tests that match real users and stay stable in CI, with a focus on sessions, MFA, and recovery.

Viola Lykova
Senior Software Engineer

I'm a Senior Software Engineer and Cypress Ambassador. I build security-aware authentication tests that match real users and stay stable in CI, with a focus on sessions, MFA, and recovery.

Steve
I just learned about a Companies House website security blunder. It's been present for about 5 months and allows anyone who has a Companies House account to view and modify the data of any other account. No tools or skills required - just a browser that has a Back button. https://www.youtube.com/watch?v=WWnnmr9NN9M Maybe this bug was not detected during testing precisely because it is such a trivial attack that a tester might not bother doing it. Such is the joy of being a tester!

Sign in to comment
MoT London
More Talks
Vibe Coding for QA: Build a PRD-to-Test-Case Generator MoT San Francisco

1h 4m 11s

System design interview for test engineers MoT Manchester

0h 21m 42s

Software Testing Live: Episode 06 - Don't automate everything, review everything

1h 24m 8s

Subscribe to our newsletter