Security Guides
65 step-by-step guides for fixing security vulnerabilities in vibe-coded apps. Each guide includes code examples, common mistakes to avoid, and verification steps.
Bolt.new
3 guidesHow to Secure Your Bolt.new App
Comprehensive guide to securing Bolt.new applications. Fix exposed API keys, add security headers, configure authentication, and protect your database.
How to Fix API Key Exposure in Bolt.new Apps
Fix exposed API keys in Bolt.new applications. Find leaked secrets, rotate keys, and move them to server-side API routes.
How to Deploy Bolt.new Apps Securely
Secure deployment guide for Bolt.new applications. Configure environment variables, add security headers, and run pre-launch security checks.
Cursor
2 guidesHow to Secure Your Cursor-Built App
Step-by-step guide to securing applications built with Cursor AI. Cover API key management, security headers, authentication, and code review practices.
How to Fix API Key Exposure in Cursor-Built Apps
Find and fix exposed API keys in applications built with Cursor AI. Rotate compromised keys, set up environment variables, and prevent future leaks.
Firebase
8 guidesHow to Secure Your Firebase Studio App
Complete security guide for Firebase Studio applications. Configure Security Rules, manage API keys, set up authentication, and protect Cloud Functions.
How to Secure Your Firebase App
Step-by-step guide to securing Firebase applications. Configure Security Rules, restrict API keys, protect Cloud Functions, and harden authentication.
How to Fix API Key Exposure in Firebase Studio Apps
Fix exposed secrets in Firebase Studio applications. Understand which keys are safe, secure Cloud Function secrets, and restrict API keys.
How to Fix Firebase API Key Exposure
Understand Firebase API key security. Learn why Firebase keys are public by design and how to restrict them properly.
How to Add Security Rules to Firebase
Write and deploy Firebase Security Rules for Firestore, Realtime Database, and Storage. Protect your data with proper access controls.
How to Add Security Rules to Firebase Studio Apps
Configure Firebase Security Rules for apps built with Firebase Studio. Protect Firestore, Storage, and Cloud Functions.
How to Deploy Firebase Apps Securely
Secure deployment guide for Firebase applications. Verify Security Rules, restrict API keys, configure auth, and deploy with confidence.
How to Add Authentication to Firebase Studio Apps
Add Firebase Authentication to your Firebase Studio app. Configure email/password, Google sign-in, and secure authentication flows.
Lovable
5 guidesHow to Secure Your Lovable App
Learn how to secure your Lovable app with this comprehensive guide. Fix RLS, protect API keys, add security headers, and harden authentication.
How to Fix API Key Exposure in Lovable Apps
Fix exposed API keys in your Lovable app. Learn to identify leaked secrets, move them to Supabase Edge Functions, and prevent future exposure.
How to Add Row Level Security to Your Lovable App
Add Row Level Security (RLS) to your Lovable Supabase app. Write policies for every table, test access controls, and prevent unauthorized data access.
How to Deploy Lovable Apps Securely
Secure deployment checklist for Lovable applications. Configure Supabase security, add headers, set up monitoring, and verify before launch.
How to Add Authentication to Your Lovable App
Add secure authentication to your Lovable app using Supabase Auth. Set up email/password login, OAuth providers, and protected routes.
Netlify
3 guidesHow to Secure Your Netlify App
Guide to securing Netlify deployments. Add security headers, protect environment variables, secure Netlify Functions, and configure access controls.
How to Fix API Key Exposure in Netlify Apps
Fix exposed API keys in Netlify deployments. Move secrets from code to Netlify environment variables and secure serverless functions.
How to Deploy to Netlify Securely
Secure deployment guide for Netlify. Configure headers, protect deploy previews, secure functions, and verify security before launch.
Replit
3 guidesHow to Secure Your Replit App
Learn how to secure your Replit application. Manage secrets properly, configure security headers, protect your database, and handle authentication safely.
How to Fix API Key Exposure in Replit Apps
Fix exposed API keys in your Replit application. Use Replit Secrets, secure public repls, and prevent credential leaks.
How to Deploy Replit Apps Securely
Secure deployment guide for Replit applications. Configure secrets, set visibility, add security headers, and protect public endpoints.
Supabase
4 guidesHow to Secure Your Supabase App
Complete guide to securing Supabase applications. Enable RLS, write policies, protect Edge Functions, manage auth, and lock down storage buckets.
How to Fix Supabase API Key Exposure
Understand Supabase key types, fix exposed service_role keys, and properly configure anon key security with Row Level Security.
How to Add Row Level Security to Supabase
Complete guide to implementing Row Level Security in Supabase. Enable RLS, write policies, handle edge cases, and test your security configuration.
How to Add Authentication to Your Supabase App
Add Supabase Authentication to your app. Configure email/password, OAuth, magic links, and integrate auth with Row Level Security.
Vercel
3 guidesHow to Secure Your Vercel App
Comprehensive guide to securing Vercel deployments. Configure security headers, protect environment variables, secure API routes, and harden authentication.
How to Fix API Key Exposure in Vercel Apps
Fix exposed API keys in Vercel deployments. Use Vercel environment variables correctly, avoid NEXT_PUBLIC_ prefix for secrets, and secure API routes.
How to Deploy to Vercel Securely
Secure deployment checklist for Vercel. Protect environment variables, configure headers, secure preview deployments, and set up monitoring.
Windsurf
3 guidesHow to Secure Your Windsurf App
Complete guide to securing Windsurf-built applications. Learn to fix API key exposure, add security headers, protect databases, and implement authentication.
How to Fix API Key Exposure in Windsurf Apps
Find and fix API keys exposed in Windsurf-generated applications. Rotate secrets, configure environment variables, and add leak prevention.
How to Add Authentication to Your Windsurf App
Add secure authentication to Windsurf-built applications. Implement Auth.js, protect routes, and configure session management.
v0
3 guidesHow to Secure Your v0 App
Guide to securing v0 by Vercel generated applications. Add security headers, protect API routes, manage secrets, and implement authentication.
How to Fix API Key Exposure in v0 Apps
Fix exposed API keys in v0 by Vercel generated applications. Move secrets to Vercel environment variables and secure API routes.
How to Deploy v0 Apps Securely
Secure deployment checklist for v0 by Vercel applications. Configure Vercel settings, protect preview deployments, and verify security.
API Keys & Secrets
3 guidesHow to Fix API Key Exposure in Railway Apps
Fix exposed API keys in Railway deployments. Use Railway Variables, rotate compromised credentials, and secure your deployment.
How to Secure Environment Variables
Learn how to manage environment variables securely. Avoid leaking secrets in frontend bundles, git history, and CI/CD logs.
How to Rotate API Keys
Safely rotate API keys without downtime. Plan the rotation, update all consumers, verify functionality, and revoke old keys.
Authentication
3 guidesHow to Add Two-Factor Authentication
Implement two-factor authentication (2FA) with TOTP. Add authenticator app support, backup codes, and secure enrollment flow.
How to Hash Passwords Securely
Implement secure password hashing with bcrypt or Argon2. Understand salt rounds, migration strategies, and password policy enforcement.
How to Secure Your OAuth Implementation
Implement OAuth securely with PKCE, state parameters, proper redirect validation, and secure token storage.
General Security
15 guidesHow to Secure Your Railway App
Guide to securing Railway deployments. Manage secrets, configure networking, protect databases, and set up secure deployment practices.
How to Add Rate Limiting
Add rate limiting to your API to prevent abuse. Configure per-IP and per-user limits, handle distributed environments, and set appropriate thresholds.
How to Secure API Endpoints
Comprehensive guide to securing API endpoints. Add authentication, input validation, rate limiting, and proper error handling.
How to Secure File Uploads
Secure file upload functionality in your application. Validate file types, limit sizes, scan for malware, and store files safely.
How to Secure JWT Tokens
Implement JWT tokens securely. Choose the right algorithm, set proper expiration, handle refresh tokens, and prevent common JWT attacks.
How to Fix Mixed Content Warnings
Fix mixed content warnings in your HTTPS website. Find and fix HTTP resources, update URLs, and configure automatic upgrades.
How to Implement Content Security Policy
Full guide to implementing CSP. Build a policy from scratch, test in report-only mode, handle third-party scripts, and deploy safely.
How to Secure Cookies
Configure cookies securely with HttpOnly, Secure, SameSite, and proper expiration. Prevent session hijacking and CSRF via cookies.
How to Secure Database Connections
Secure your database connections with SSL/TLS, parameterized queries, least-privilege access, and proper credential management.
Security Audit Checklist
Complete security audit checklist for web applications. Check authentication, authorization, headers, secrets, database security, and more.
How to Secure Third-Party Dependencies
Manage npm dependency security. Audit for vulnerabilities, pin versions, use lockfiles, and set up automated security monitoring.
How to Implement HTTPS Correctly
Set up HTTPS properly with TLS certificates, HSTS, and redirect configuration. Avoid mixed content and ensure end-to-end encryption.
How to Prevent Clickjacking
Protect your application against clickjacking attacks. Configure X-Frame-Options, CSP frame-ancestors, and test your protection.
How to Protect Against Brute Force Attacks
Defend against brute force attacks on login, API endpoints, and passwords. Implement rate limiting, account lockout, and CAPTCHA.
How to Secure WebSocket Connections
Secure WebSocket connections with authentication, input validation, rate limiting, and proper origin checking.
Security Headers
3 guidesHow to Add Security Headers in Next.js
Add security headers to your Next.js app. Configure X-Content-Type-Options, CSP, HSTS, and more via next.config.js or middleware.
How to Add a Content Security Policy Header
Implement Content Security Policy (CSP) to prevent XSS attacks. Learn CSP directives, nonce-based policies, and report-only mode.
How to Fix CORS Errors
Fix Cross-Origin Resource Sharing errors in your web application. Configure CORS headers correctly for APIs, handle preflight requests, and avoid pitfalls.
Vulnerability Fixes
3 guidesHow to Prevent XSS Attacks
Prevent Cross-Site Scripting (XSS) in your web application. Implement output encoding, CSP, input validation, and safe DOM manipulation.
How to Prevent SQL Injection
Prevent SQL injection attacks in your application. Use parameterized queries, ORMs, and input validation to protect your database.
How to Implement CSRF Protection
Protect your application against Cross-Site Request Forgery. Implement CSRF tokens, SameSite cookies, and proper origin validation.
Find What Needs Fixing
Run an automated scan to identify which guides are relevant to your app. Get a prioritized list of issues with direct links to fix instructions.
Get Starter Scan