TL;DR: We all build auth.js. We all include the reset_token email link. And we all know it’s a single point of failure. If your user loses that one email, their account is bricked. We're building an AI that uses cognitive psychology to get them back in, and it's already working.
Let's be honest, auth is the most boring part of any project.
We npm install bcrypt, hash a password, and call it a day. Then, we build the "forgot password" flow. It’s a textbook feature:
- User clicks a link.
- We generate a 24-hour
reset_token. - We email it to
user.email. - User clicks,
UPDATE users SET ....
We've all written this exact logic. And for 99% of users, it's fine.
But what about the other 1%? The user who also lost access to that ancient @hotmail.com recovery email?
They email support, and we have to send that dreaded reply:
"We're sorry, but without access to your verified email, we cannot recover your account."
In developer terms: "You're hosed. All your data is gone."
The Old Fix Was a Dumpster Fire
We used to have "Security Questions."
What was your first pet's name?
What is your mother's maiden name?
This was a security nightmare. It's static, low-entropy data that's probably already in a data breach or on their public Facebook profile. It’s how social engineers attack accounts.
But this got us thinking... what if we could use the science of social engineering, not for attacking, but for recovering?
The "Aha!" Moment: Humans Don't Make Passwords, Habits Do
A password isn't a random string. It's a psychological artifact. It’s a story about the person who made it.
When we create a password, we’re not thinking about entropy. We're thinking:
"Okay, it needs 8 chars, an upper, a number, and a symbol. I'll use my dog's name, 'Buddy', capitalize the 'B', add my kid's birth year '2014', and an '!' at the end."
Buddy2014!
A developer's password (P@sswrd_v2_FINAL!) looks totally different from a musician's (RedHotCh1l1s*).
The "secret" isn't Buddy. The secret is the pattern. The psychology.
And that's not a regex problem. That’s an AI problem.
What Our AI Actually Needs (Hint: It's Not "Mother's Maiden Name")
This is why we built aiipassword.com.
It's not a brute-force tool. It's a "cognitive recovery" engine. It works by building a psychological profile of the user based on the habits they actually use.
Instead of asking for "pet's name," our prompt is designed to figure out how you think:
// This is the data that REALLY matters
{
"jobType": "logical_technical",
"capitalizeWords": "first_letter_only",
"letterReplacement": "yes_common_e=3,a=4",
"commonSymbols": "!_$",
"websiteCategory": "gaming",
"complexityLevel": "moderate"
}
The AI is pre-trained on a massive dataset of these human password patterns.
- It knows that a
jobType: "creative"might mean word combinations. - It knows
jobType: "logical"might mean leet speak and number sequences. - It combines this with the user's actual clues (
petNames,birthDay,commonNumbers) to predict what that specific kind of person would create.
It's literally using the logic of social engineering to help you.
"This Sounds Like a Security Risk."
I know what you're thinking. "You're just typing password clues into a textarea? Where does that go?"
Nowhere. That's the entire point. A tool like this can only exist if it's "privacy-by-design."
We are fanatical about this.
- NO DATA IS STORED. All inputs are processed transiently. The AI builds the predictions, returns the list, and the server forgets it ever happened. Your session is your own.
- WE NEVER ASK WHAT SITE IT'S FOR. We don't want to know. It's irrelevant. The AI analyzes the human pattern, not the target.
- THE MODEL IS PRE-TRAINED. Your inputs are never, ever used for training.
The Takeaway: This Actually Works
This isn't a "hello world" project. This is a specialized tool that has already recovered thousands of passwords for users who were permanently locked out.
And the stats are what blew us away.
On the first try, aiipassword.com is showing:
- A 54% success rate for easy and medium-complexity passwords.
- A 16% success rate for complex passwords.
That's a 1-in-6 chance of recovering a complex password that was otherwise lost forever.
The reset_token email flow is broken. It's a 20-year-old solution to a problem that's only getting worse. It's time to stop telling users "you're hosed" and start using modern AI to solve the problem.
Top comments (0)