Why session safety matters
Logging in is just the first step. What happens in the seconds after you authenticate determines whether your session is genuinely secure — or just looks like it is. For KiddyCash users managing kids’ wallets, allowances, or school subscription payouts in KES, a compromised session can quietly expose transaction codes and family data before you notice anything is wrong.
This article walks you through the specific signals that confirm your session was set up correctly, and what to do if something looks off.
What a healthy session looks like
Once you complete login at https://kiddy.cash/login, KiddyCash runs a series of checks in the background before it hands you an active session. Here’s what you should see on a clean login:
1. A smooth OTP handoff If you signed in via email and OTP (as described in how to log in with email and OTP), the OTP should arrive within seconds and expire quickly. A delayed OTP — or one that arrives after you’ve already been redirected — is worth treating with suspicion. It may indicate a replay attempt or a slow network that left the session handshake incomplete.
2. Correct dashboard context After login, check that the dashboard immediately reflects your data: your linked family, the right wallet balances, any active campaigns or badge progress. If you see a blank state on an account that should have history, your session token may not have loaded correctly. Refresh once; if it persists, log out and back in.
3. No unexpected KYC/KYB prompts KiddyCash only triggers KYC or KYB flows at specific points — during initial sign-up or when your account scope changes (for example, when a business or school is added). A KYC prompt appearing mid-session on an already-verified account is unusual and worth flagging to support.
4. Session device and location match Open your account settings and check the active sessions panel. The device name, browser, and approximate location (city-level — Nairobi, Lagos, Accra) should match where you actually are. KiddyCash flags anomalous logins, but you should verify this yourself, especially if you recently used M-Pesa or another payment method that routes through a different network node.
Signals that something is off
- The URL after login doesn’t return to your intended page — it drops you at a generic home screen instead.
- Your allowance schedules or transaction code history load partially, then reset.
- You receive a second OTP you didn’t request immediately after logging in.
- The session panel shows an unrecognised device or a city you haven’t been in recently.
Any of these alone could be a fluke. Two or more happening together is a stronger signal that the session wasn’t established cleanly.
What to do
- Log out immediately using the account menu — don’t just close the tab.
- Revoke other sessions from the active sessions panel to invalidate any tokens you don’t recognise.
- Change your login email’s password at the provider level (Gmail, Outlook, etc.), since KiddyCash authenticates via OTP but your email account is still the root credential.
- Contact support with your account ID and the approximate time of the suspicious login. The KiddyCash team can audit session logs and, if needed, freeze wallet activity while you regain control.
If you’re a business or school admin managing multiple sub-accounts, extend this check to any staff who share dashboard access — a compromised admin session has broader exposure than an individual family account.
For context on recent changes to how KiddyCash handles login flows, see what’s new in onboarding in KiddyCash and the deeper technical breakdown in a closer look at onboarding in KiddyCash.