Security Risk Assessments

Risk assessments for 55 AI coding platforms. Understand the security risks, their likelihood, and how to mitigate them.

All Platforms

Lovable

Lovable Security Risks (2026): CVE-2025-48757, RLS Misconfig & the API Key Bundle Leak

Concrete security risks in Lovable-built apps, ranked by likelihood and impact. The same Supabase RLS gap CVE-2025-48757 exposed across 170+ apps, plus API key leaks from JS bundles, broken auth bypass paths, and what Lovable's defaults do (and don't) prevent.

Bolt.new

Bolt.new Security Risks: Common Vulnerabilities & Fixes (2026)

Security risks in Bolt.new apps. Exposed API keys, missing Supabase RLS, weak auth, and XSS vulnerabilities — understand the risks and how to mitigate them.

Replit

Replit Security Risks: What You Need to Know

Security risks found in Replit apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

v0.dev

v0.dev Security Risks: What You Need to Know

Security risks found in v0.dev apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Cursor

Cursor Security Risks: What You Need to Know

Security risks found in Cursor apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Windsurf

Windsurf Security Risks: What You Need to Know

Security risks found in Windsurf apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Base44

Base44 Security Risks: What You Need to Know

Security risks found in Base44 apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Antigravity

Antigravity Security Risks: What You Need to Know

Security risks found in Antigravity apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Firebase

Firebase Security Risks: What You Need to Know

Security risks found in Firebase apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Supabase

Supabase Security Risks (2026): RLS Gaps, service_role Leaks & the Storage Bucket Trap

Concrete Supabase security risks ranked by likelihood and impact. The patterns that cause the 83% RLS-misconfiguration rate Escape.tech measured: tables left unprotected in public schema, service_role keys committed to repos, Storage buckets set to public, and the auth.uid() performance trap.

GitHub Copilot

GitHub Copilot Security Risks: What You Need to Know

Security risks found in GitHub Copilot apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Claude Code

Claude Code Security Risks: What You Need to Know

Security risks found in Claude Code apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Sourcegraph Cody

Sourcegraph Cody Security Risks: What You Need to Know

Security risks found in Sourcegraph Cody apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Tabnine

Tabnine Security Risks: What You Need to Know

Security risks found in Tabnine apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Vercel

Vercel Security Risks: What You Need to Know

Security risks found in Vercel apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Netlify

Netlify Security Risks (2026): Build-Time Secret Leaks, Function Surface & Deploy Preview Exposure

Concrete Netlify security risks. Build-time env vars baked into static HTML, deploy previews publicly accessible without auth, Functions running with broader permissions than the static site needs, and the Forms endpoint abuse pattern — with mitigation for each.

Railway

Railway Security Risks (2026): Database Endpoints, Variables Discipline & Container Escape Surface

Concrete Railway security risks ranked by likelihood and impact. Databases exposed to the public internet instead of Private Networking, secrets hardcoded outside Railway Variables, services with broader IAM than needed, and the container isolation gotchas — with mitigation steps.

Render

Render Security Risks: What You Need to Know

Security risks found in Render apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Fly.io

Fly.io Security Risks: What You Need to Know

Security risks found in Fly.io apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

PlanetScale

PlanetScale Security Risks: What You Need to Know

Security risks found in PlanetScale apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Neon

Neon Security Risks: What You Need to Know

Security risks found in Neon apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Turso

Turso Security Risks: What You Need to Know

Security risks found in Turso apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Bubble

Bubble Security Risks: What You Need to Know

Security risks found in Bubble apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Webflow

Webflow Security Risks: What You Need to Know

Security risks found in Webflow apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Framer

Framer Security Risks: What You Need to Know

Security risks found in Framer apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Retool

Retool Security Risks: What You Need to Know

Security risks found in Retool apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

MongoDB

MongoDB Security Risks: What You Need to Know

Security risks found in MongoDB apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

PostgreSQL

PostgreSQL Security Risks: What You Need to Know

Security risks found in PostgreSQL apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Upstash

Upstash Security Risks: What Developers Need to Know (2026)

Security risks in Upstash Redis and QStash apps. Common vulnerabilities like write token exposure, webhook spoofing, and missing TTL — plus how to fix them.

Trae AI

Trae AI Security Risks: What You Need to Know

Security risks found in Trae AI apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Devin AI

Devin AI Security Risks: What You Need to Know

Security risks found in Devin AI apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

OpenAI Codex

OpenAI Codex Security Risks: What You Need to Know

Security risks found in OpenAI Codex apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Augment Code

Augment Code Security Risks: What You Need to Know

Security risks found in Augment Code apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Emergent (emergent.sh)

Emergent (emergent.sh) Security Risks: What You Need to Know

Security risks found in Emergent (emergent.sh) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Wix Harmony

Wix Harmony Security Risks: What You Need to Know

Security risks found in Wix Harmony apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Hostinger Horizons

Hostinger Horizons Security Risks: What You Need to Know

Security risks found in Hostinger Horizons apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

SuperNinja (NinjaTech AI)

SuperNinja (NinjaTech AI) Security Risks: What You Need to Know

Security risks found in SuperNinja (NinjaTech AI) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Firebase Studio

Firebase Studio Security Risks: What You Need to Know

Security risks found in Firebase Studio apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Tempo Labs

Tempo Labs Security Risks: What You Need to Know

Security risks found in Tempo Labs apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Gemini Code (Google)

Gemini Code (Google) Security Risks: What You Need to Know

Security risks found in Gemini Code (Google) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Softr

Softr Security Risks: What You Need to Know

Security risks found in Softr apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

ToolJet

ToolJet Security Risks: What You Need to Know

Security risks found in ToolJet apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

DronaHQ

DronaHQ Security Risks: What You Need to Know

Security risks found in DronaHQ apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Jotform Apps

Jotform Apps Security Risks: What You Need to Know

Security risks found in Jotform Apps apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

UI Bakery

UI Bakery Security Risks: What You Need to Know

Security risks found in UI Bakery apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Orchids

Orchids Security Risks: What You Need to Know

Security risks found in Orchids apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

VibeSDK (Cloudflare)

VibeSDK (Cloudflare) Security Risks: What You Need to Know

Security risks found in VibeSDK (Cloudflare) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Amazon Q Developer

Amazon Q Developer Security Risks: What You Need to Know

Security risks found in Amazon Q Developer apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Cline

Cline Security Risks: What You Need to Know

Security risks found in Cline apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Airtable

Airtable Security Risks: What You Need to Know

Security risks found in Airtable apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Appwrite

Appwrite Security Risks: What You Need to Know

Security risks found in Appwrite apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Convex

Convex Security Risks: What You Need to Know

Security risks found in Convex apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Xano

Xano Security Risks: What You Need to Know

Security risks found in Xano apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

FlutterFlow

FlutterFlow Security Risks: What You Need to Know

Security risks found in FlutterFlow apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Glide

Glide Security Risks: What You Need to Know

Security risks found in Glide apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.

Assess your app's risk profile

Run a security scan to identify risks specific to your application.

Get Starter Scan