Bubble
Security Checklist

Bubble Security Checklist

Last updated: January 12, 2026

Use this checklist to ensure your Bubble application is secure before launch. 4 critical items require immediate attention.

17
Total Items
4
Critical
1
Auto-Scanned

Why This Security Checklist Matters

Security checklists serve as systematic guides for identifying vulnerabilities that might otherwise be overlooked during rapid development cycles. For Bubble applications specifically, this checklist addresses the most common security gaps that emerge when using AI-assisted development workflows.

Research from multiple security organizations indicates that approximately 80% of AI-built applications contain at least one exploitable vulnerability at launch. The vulnerabilities are often predictable—they follow patterns that this checklist is designed to catch. By systematically reviewing each item, you significantly reduce the risk of launching an insecure application.

Unlike generic security checklists, this guide focuses specifically on vulnerabilities prevalent in Bubble applications. Each item has been prioritized based on real-world attack patterns and the potential impact of exploitation. Critical items should be addressed before any production deployment.

Critical Priority

Critical items can lead to complete application compromise, data breaches, or unauthorized access to all user accounts. These must be addressed before deploying to production. Attackers actively scan for these vulnerabilities.

High Priority

High priority items represent significant security risks that could allow unauthorized access to sensitive data or functionality. While not immediately catastrophic, these vulnerabilities should be fixed as soon as possible.

Medium/Low Priority

Medium and low priority items strengthen your overall security posture. While they may not be immediately exploitable, addressing them prevents attack chains and defense-in-depth gaps.

Manual vs Automated Security Checking

While manual security reviews are thorough, they're time-consuming and prone to human error. Automated scanning catches common vulnerabilities instantly, freeing you to focus on business logic and complex security decisions.

Items VAS Automates

  • Exposed API keys and secrets in JavaScript bundles
  • HTTP security header configuration
  • Supabase RLS policy testing
  • Firebase Security Rules validation
  • Cookie security attributes

Manual Review Still Required

  • Business logic vulnerabilities
  • Custom authentication implementations
  • Access control logic in API routes
  • Data validation requirements
  • Third-party integration security

Privacy Rules

critical

Configure privacy rules for all data types

Every data type should have explicit privacy rules defining access

critical

Test privacy rules as different user roles

Verify rules work by testing as logged out, regular user, and admin

critical

Don't rely on 'everyone' privacy level for sensitive data

Avoid public access to user data, financial info, or PII

high

Use 'This Thing's Creator' pattern

Restrict data access to the user who created it where appropriate

high

Review search constraints

Ensure searches respect privacy rules and don't leak data

API Workflow Security

critical

Secure API workflows with authentication

Don't expose API workflows that modify data without auth

high

Use authentication tokens for API calls

Implement token-based auth for external API access

high

Validate input in workflows

Check data types and constraints in workflow logic

high

Rate limit API endpoints

Prevent abuse by limiting API call frequency

Plugin Security

high

Audit installed plugins

Review what data and permissions each plugin requires

high

Only use plugins from trusted developers

Check plugin reputation and reviews before installing

medium

Remove unused plugins

Uninstall plugins you're not actively using

medium

Keep plugins updated

Update plugins to get security fixes

General Security

high

Enable SSL (automatic for paid plans)

Auto

Ensure HTTPS is enforced for your Bubble app

medium

Configure option sets carefully

Option sets are often public - don't put secrets in them

high

Review page access rules

Configure which pages require login

high

Test with browser developer tools

Check what data is exposed in network requests

Don't Check Manually

VAS automatically checks 1 of these 17 items. Get instant results with detailed remediation guidance.

Run Automated Security Scan

Frequently Asked Questions

How do Bubble privacy rules work?

Privacy rules define who can view and modify each data type. You can base access on user roles, ownership ('This Thing's Creator'), or custom conditions. Rules are enforced server-side, so they can't be bypassed from the frontend.

Can users bypass privacy rules?

Properly configured privacy rules cannot be bypassed - they're enforced server-side. However, rules that check client-side conditions or rely on hidden fields can potentially be exploited. Test your rules by logging in as different user types.