Supabase
Security FAQ

Can Supabase apps be hacked?

Short Answer

Yes, Supabase apps can be hacked if not properly secured. The most common vulnerabilities include exposed API keys, missing database security, and weak authentication.

Detailed Answer

Supabase apps are built on modern technologies that are secure by design, but security requires proper configuration. Common attack vectors include:

  1. **Database Exposure**: If database security (RLS/Security Rules) isn't configured, attackers can access all data directly.

2. **API Key Theft**: Secrets hardcoded in frontend code can be extracted and abused.

3. **Authentication Bypass**: Weak password policies and missing rate limiting enable account takeover.

4. **XSS Attacks**: If user input isn't properly sanitized, attackers can inject malicious scripts.

The good news is that all these issues are preventable with proper security practices. VAS scans for these vulnerabilities automatically.

Security Research & Statistics

10.3%

of Lovable applications (170 out of 1,645) had exposed user data in the CVE-2025-48757 incident

Source: CVE-2025-48757 security advisory

91%

of data breaches involve databases with misconfigured access controls

Source: Verizon Data Breach Investigations Report

4.45 million USD

average cost of a data breach in 2023

Source: IBM Cost of a Data Breach Report 2023

Expert Perspectives

Row Level Security is not optional for production applications. Without RLS, your anon key grants full public access to your database.

Supabase DocumentationOfficial Supabase Security Guidelines

Service keys should never be used in the browser or exposed to customers. They bypass all Row Level Security policies.

Supabase DocumentationOfficial Supabase Security Guidelines

Check Your Supabase App's Security

VAS scans for all the security issues mentioned above. Get a comprehensive security report in minutes.

Scan Your App