Browser Not Opening During Login
When runningpanguard login, the CLI attempts to open your default browser for authentication. If the browser does not open:
Use --no-browser flag
Use --no-browser flag
Skip the automatic browser launch and log in manually:The CLI will print a URL. Copy and paste it into your browser manually, then enter the returned token in the CLI prompt.
SSH / Headless Environment
SSH / Headless Environment
On servers without a desktop environment, always use Alternatively, log in on a machine with a browser and copy the credentials file:
--no-browser:WSL (Windows Subsystem for Linux)
WSL (Windows Subsystem for Linux)
WSL may not be able to launch a Windows browser. Set the browser path:Or use
--no-browser as described above.Login Timeout
If the login flow times out before you complete authentication:-
Retry the login — the default timeout is 120 seconds:
-
Check your internet connection — the CLI must reach
auth.panguard.ai -
If behind a corporate proxy, set the proxy environment variable:
Token Expired
Tier Insufficient
| Feature | Minimum Tier |
|---|---|
| Basic scan | Community |
| Layer 1 Guard | Community |
| Full Guard (3 layers) | Solo |
| Chat notifications | Solo |
| Trap (honeypots) | Pro |
| Report generation | Pro |
| Custom AI models | Business |
| API access | Business |
-
Upgrade your subscription:
-
Check your current tier:
-
If you recently upgraded, re-login to refresh your session:
Credentials File Permissions
The credentials file at~/.panguard/credentials.json stores your authentication token. It should be readable only by your user.
Fix permissions:
Invalid or Corrupted Credentials
If you see errors likeError: Invalid token format or Error: Failed to parse credentials:
Google OAuth Issues
If Google login fails:Popup blocked
Popup blocked
Allow popups from
auth.panguard.ai in your browser settings.Redirect URI mismatch
Redirect URI mismatch
This is a server-side configuration issue. Contact support if you encounter this on
auth.panguard.ai.Self-hosted auth server
Self-hosted auth server
Ensure
GOOGLE_CLIENT_ID and GOOGLE_CLIENT_SECRET are correctly configured, and the redirect URI in your Google Cloud Console matches your auth server URL.Two-Factor Authentication (2FA) Issues
Lost authenticator app
Lost authenticator app
Use one of your backup codes to log in:Each backup code is single-use. After logging in, disable 2FA and re-enable it to get new backup codes.
TOTP code not accepted
TOTP code not accepted
- Verify your device clock is synchronized (TOTP is time-based)
- Ensure you are using the code for the correct account
- Codes rotate every 30 seconds — try waiting for the next code
- If the problem persists, use a backup code