Security Guides

65 step-by-step guides for fixing security vulnerabilities in vibe-coded apps. Each guide includes code examples, common mistakes to avoid, and verification steps.

Bolt.new

3 guides

Cursor

2 guides

Firebase

8 guides

Lovable

5 guides

Netlify

3 guides

Replit

3 guides

Supabase

4 guides

Vercel

3 guides

Windsurf

3 guides

v0

3 guides

API Keys & Secrets

3 guides

Authentication

3 guides

Deployment

1 guides

General Security

15 guides

How to Secure Your Railway App

7 steps

Guide to securing Railway deployments. Manage secrets, configure networking, protect databases, and set up secure deployment practices.

How to Add Rate Limiting

6 steps

Add rate limiting to your API to prevent abuse. Configure per-IP and per-user limits, handle distributed environments, and set appropriate thresholds.

How to Secure API Endpoints

6 steps

Comprehensive guide to securing API endpoints. Add authentication, input validation, rate limiting, and proper error handling.

How to Secure File Uploads

5 steps

Secure file upload functionality in your application. Validate file types, limit sizes, scan for malware, and store files safely.

How to Secure JWT Tokens

5 steps

Implement JWT tokens securely. Choose the right algorithm, set proper expiration, handle refresh tokens, and prevent common JWT attacks.

How to Fix Mixed Content Warnings

6 steps

Fix mixed content warnings in your HTTPS website. Find and fix HTTP resources, update URLs, and configure automatic upgrades.

How to Implement Content Security Policy

5 steps

Full guide to implementing CSP. Build a policy from scratch, test in report-only mode, handle third-party scripts, and deploy safely.

How to Secure Cookies

6 steps

Configure cookies securely with HttpOnly, Secure, SameSite, and proper expiration. Prevent session hijacking and CSRF via cookies.

How to Secure Database Connections

6 steps

Secure your database connections with SSL/TLS, parameterized queries, least-privilege access, and proper credential management.

Security Audit Checklist

8 steps

Complete security audit checklist for web applications. Check authentication, authorization, headers, secrets, database security, and more.

How to Secure Third-Party Dependencies

6 steps

Manage npm dependency security. Audit for vulnerabilities, pin versions, use lockfiles, and set up automated security monitoring.

How to Implement HTTPS Correctly

6 steps

Set up HTTPS properly with TLS certificates, HSTS, and redirect configuration. Avoid mixed content and ensure end-to-end encryption.

How to Prevent Clickjacking

5 steps

Protect your application against clickjacking attacks. Configure X-Frame-Options, CSP frame-ancestors, and test your protection.

How to Protect Against Brute Force Attacks

6 steps

Defend against brute force attacks on login, API endpoints, and passwords. Implement rate limiting, account lockout, and CAPTCHA.

How to Secure WebSocket Connections

6 steps

Secure WebSocket connections with authentication, input validation, rate limiting, and proper origin checking.

Security Headers

3 guides

Vulnerability Fixes

3 guides

Find What Needs Fixing

Run an automated scan to identify which guides are relevant to your app. Get a prioritized list of issues with direct links to fix instructions.

Get Starter Scan