Security Risk Assessments
Risk assessments for 55 AI coding platforms. Understand the security risks, their likelihood, and how to mitigate them.
All Platforms
Lovable
Lovable Security Risks (2026): CVE-2025-48757, RLS Misconfig & the API Key Bundle Leak
Concrete security risks in Lovable-built apps, ranked by likelihood and impact. The same Supabase RLS gap CVE-2025-48757 exposed across 170+ apps, plus API key leaks from JS bundles, broken auth bypass paths, and what Lovable's defaults do (and don't) prevent.
Bolt.new
Bolt.new Security Risks: Common Vulnerabilities & Fixes (2026)
Security risks in Bolt.new apps. Exposed API keys, missing Supabase RLS, weak auth, and XSS vulnerabilities — understand the risks and how to mitigate them.
Replit
Replit Security Risks: What You Need to Know
Security risks found in Replit apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
v0.dev
v0.dev Security Risks: What You Need to Know
Security risks found in v0.dev apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Cursor
Cursor Security Risks: What You Need to Know
Security risks found in Cursor apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Windsurf
Windsurf Security Risks: What You Need to Know
Security risks found in Windsurf apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Base44
Base44 Security Risks: What You Need to Know
Security risks found in Base44 apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Antigravity
Antigravity Security Risks: What You Need to Know
Security risks found in Antigravity apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Firebase
Firebase Security Risks: What You Need to Know
Security risks found in Firebase apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Supabase
Supabase Security Risks (2026): RLS Gaps, service_role Leaks & the Storage Bucket Trap
Concrete Supabase security risks ranked by likelihood and impact. The patterns that cause the 83% RLS-misconfiguration rate Escape.tech measured: tables left unprotected in public schema, service_role keys committed to repos, Storage buckets set to public, and the auth.uid() performance trap.
GitHub Copilot
GitHub Copilot Security Risks: What You Need to Know
Security risks found in GitHub Copilot apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Claude Code
Claude Code Security Risks: What You Need to Know
Security risks found in Claude Code apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Sourcegraph Cody
Sourcegraph Cody Security Risks: What You Need to Know
Security risks found in Sourcegraph Cody apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Tabnine
Tabnine Security Risks: What You Need to Know
Security risks found in Tabnine apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Vercel
Vercel Security Risks: What You Need to Know
Security risks found in Vercel apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Netlify
Netlify Security Risks (2026): Build-Time Secret Leaks, Function Surface & Deploy Preview Exposure
Concrete Netlify security risks. Build-time env vars baked into static HTML, deploy previews publicly accessible without auth, Functions running with broader permissions than the static site needs, and the Forms endpoint abuse pattern — with mitigation for each.
Railway
Railway Security Risks (2026): Database Endpoints, Variables Discipline & Container Escape Surface
Concrete Railway security risks ranked by likelihood and impact. Databases exposed to the public internet instead of Private Networking, secrets hardcoded outside Railway Variables, services with broader IAM than needed, and the container isolation gotchas — with mitigation steps.
Render
Render Security Risks: What You Need to Know
Security risks found in Render apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Fly.io
Fly.io Security Risks: What You Need to Know
Security risks found in Fly.io apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
PlanetScale
PlanetScale Security Risks: What You Need to Know
Security risks found in PlanetScale apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Neon
Neon Security Risks: What You Need to Know
Security risks found in Neon apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Turso
Turso Security Risks: What You Need to Know
Security risks found in Turso apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Bubble
Bubble Security Risks: What You Need to Know
Security risks found in Bubble apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Webflow
Webflow Security Risks: What You Need to Know
Security risks found in Webflow apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Framer
Framer Security Risks: What You Need to Know
Security risks found in Framer apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Retool
Retool Security Risks: What You Need to Know
Security risks found in Retool apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
MongoDB
MongoDB Security Risks: What You Need to Know
Security risks found in MongoDB apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
PostgreSQL
PostgreSQL Security Risks: What You Need to Know
Security risks found in PostgreSQL apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Upstash
Upstash Security Risks: What Developers Need to Know (2026)
Security risks in Upstash Redis and QStash apps. Common vulnerabilities like write token exposure, webhook spoofing, and missing TTL — plus how to fix them.
Trae AI
Trae AI Security Risks: What You Need to Know
Security risks found in Trae AI apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Devin AI
Devin AI Security Risks: What You Need to Know
Security risks found in Devin AI apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
OpenAI Codex
OpenAI Codex Security Risks: What You Need to Know
Security risks found in OpenAI Codex apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Augment Code
Augment Code Security Risks: What You Need to Know
Security risks found in Augment Code apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Emergent (emergent.sh)
Emergent (emergent.sh) Security Risks: What You Need to Know
Security risks found in Emergent (emergent.sh) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Wix Harmony
Wix Harmony Security Risks: What You Need to Know
Security risks found in Wix Harmony apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Hostinger Horizons
Hostinger Horizons Security Risks: What You Need to Know
Security risks found in Hostinger Horizons apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
SuperNinja (NinjaTech AI)
SuperNinja (NinjaTech AI) Security Risks: What You Need to Know
Security risks found in SuperNinja (NinjaTech AI) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Firebase Studio
Firebase Studio Security Risks: What You Need to Know
Security risks found in Firebase Studio apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Tempo Labs
Tempo Labs Security Risks: What You Need to Know
Security risks found in Tempo Labs apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Gemini Code (Google)
Gemini Code (Google) Security Risks: What You Need to Know
Security risks found in Gemini Code (Google) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Softr
Softr Security Risks: What You Need to Know
Security risks found in Softr apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
ToolJet
ToolJet Security Risks: What You Need to Know
Security risks found in ToolJet apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
DronaHQ
DronaHQ Security Risks: What You Need to Know
Security risks found in DronaHQ apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Jotform Apps
Jotform Apps Security Risks: What You Need to Know
Security risks found in Jotform Apps apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
UI Bakery
UI Bakery Security Risks: What You Need to Know
Security risks found in UI Bakery apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Orchids
Orchids Security Risks: What You Need to Know
Security risks found in Orchids apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
VibeSDK (Cloudflare)
VibeSDK (Cloudflare) Security Risks: What You Need to Know
Security risks found in VibeSDK (Cloudflare) apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Amazon Q Developer
Amazon Q Developer Security Risks: What You Need to Know
Security risks found in Amazon Q Developer apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Cline
Cline Security Risks: What You Need to Know
Security risks found in Cline apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Airtable
Airtable Security Risks: What You Need to Know
Security risks found in Airtable apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Appwrite
Appwrite Security Risks: What You Need to Know
Security risks found in Appwrite apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Convex
Convex Security Risks: What You Need to Know
Security risks found in Convex apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Xano
Xano Security Risks: What You Need to Know
Security risks found in Xano apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
FlutterFlow
FlutterFlow Security Risks: What You Need to Know
Security risks found in FlutterFlow apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Glide
Glide Security Risks: What You Need to Know
Security risks found in Glide apps — with real-world examples. From analyzing real deployments. Fixes included for each risk.
Assess your app's risk profile
Run a security scan to identify risks specific to your application.
Get Starter Scan