Login form variants
Each variant is a different shape of login form. They all submit synthetic credentials to a sink that accepts anything, then behaves exactly like a real login would: it sets a session cookie (HttpOnly __session + JS-readable bb_session_js companion + x-auth-token header) and 302-redirects to /. There is no diagnostic echo of what you submitted — that would change the shape the intermediary sees. To verify your form data reached the server, check your browser's network tab.
The test point is whether the intermediary (a) lets the page load, (b) lets the form submit, and (c) passes the auth response (Set-Cookie + redirect) back to the client.
Do not submit real credentials. Use throwaway / synthetic values only.
- Standard POST with type=password
- POST with type=text masquerading as a password
- POST with renamed fields
- GET-method login
- Multi-step (email → password page)
- XHR-based POST (no <form> element)
What each variant looks like to the intermediary
Typical things to look for:
- curl through an intermediary: whether POSTs are blocked at the intermediary tier (and if so, whether the block is method-specific so the GET variant passes through).
- Playwright through an automation tool: whether variants with
input[type="password"]trip a password-typing block while non-password-typed fields fill normally, and whether the XHR variant bypasses any form-input controls entirely.