Last updated: January 12, 2026
An honest security analysis of Firebase for developers considering it for their projects.
Firebase is secure when Security Rules are properly configured. TEST MODE IS THE #1 DANGER - it grants public read/write access to your entire database. Firebase API keys are intentionally public (unlike traditional secrets). Security comes from Security Rules, not key hiding.
Firebase is backed by Google's enterprise infrastructure - the platform is not the vulnerability. TEST MODE is the #1 cause of Firebase data breaches. Unlike Supabase (SQL-based RLS), Firebase uses proprietary Security Rules syntax. The API key is meant to be public. Check your Security Rules and delete test mode before production.
Understanding Firebase security in the context of broader industry trends and research.
of Lovable applications (170 out of 1,645) had exposed user data in the CVE-2025-48757 incident
Source: CVE-2025-48757 security advisory
of data breaches involve databases with misconfigured access controls
Source: Verizon Data Breach Investigations Report
average cost of a data breach in 2023
Source: IBM Cost of a Data Breach Report 2023
“Vibe coding your way to a production codebase is clearly risky. Most of the work we do as software engineers involves evolving existing systems, where the quality and understandability of the underlying code is crucial.”
“The problem with AI-generated code isn't that it doesn't work - it's that it works just well enough to ship, but contains subtle security flaws that are hard to spot.”
Yes, Firebase runs on Google Cloud infrastructure and is SOC 2 compliant. However, test mode Security Rules (allow read, write: if true) expose your entire database. The platform is secure; your Security Rules configuration determines app security.
Firebase API keys are designed to be public - they identify your project to Google services but don't grant data access. This is different from traditional API keys. Security comes from Security Rules, not from hiding the Firebase config. The apiKey is not a secret.
Test mode sets Security Rules to 'allow read, write: if true' which grants ANYONE public read/write access to your entire database. Firebase console often defaults to test mode during setup. You MUST replace these rules before production. Check firebase.json and Firestore Rules tab.
Firebase Security Rules use a proprietary JSON-like syntax specific to Firebase. Supabase uses standard PostgreSQL Row Level Security (SQL). Firebase rules are simpler but less powerful for complex queries. Both achieve access control but RLS skills transfer across PostgreSQL databases.
Use Firebase Emulator: 'firebase emulators:start', then try reading data as an unauthenticated user. Also check the Firestore Rules tab in Firebase Console - it shows warnings about permissive rules. Never rely on client-side testing; rules run server-side.
Don't guess - scan your app and know for certain. VAS checks for all the common security issues in Firebase applications.