Security Issues
36 platform-specific vulnerabilities documented across 11 AI coding platforms. Each issue includes how it happens, its impact, and step-by-step remediation.
XSS in Lovable Apps
Learn how XSS vulnerabilities appear in Lovable-generated React apps and how to fix them before attackers exploit user trust.
Exposed API Keys in Lovable Apps
Understand which API keys in Lovable apps are safe to expose and which are critical security vulnerabilities needing immediate remediation.
Missing RLS in Lovable Apps
Lovable apps on Supabase frequently ship without Row Level Security. Learn to detect missing RLS and lock down your database before data leaks.
Broken Authentication in Lovable Apps
Lovable apps often implement auth incorrectly, relying on client-side checks that attackers easily bypass. Learn how to detect and fix broken auth.
XSS in Bolt.new Apps
Bolt.new generates full-stack apps from prompts, but the AI-written code often contains XSS vulnerabilities. Learn how to find and fix them.
Exposed API Keys in Bolt.new Apps
Bolt.new apps frequently expose secret API keys in frontend code. Learn which keys are safe and which need to be moved to the server immediately.
Missing RLS in Bolt.new Apps
Bolt.new apps using Supabase frequently deploy without Row Level Security, leaving databases wide open. Learn to detect and fix this critical issue.
Broken Authentication in Bolt.new Apps
Bolt.new generates auth flows that look secure but enforce access only in the UI. Learn how attackers bypass client-side checks and fix them.
XSS in Windsurf-Generated Apps
Windsurf AI IDE generates code from prompts, but the output frequently contains XSS vulnerabilities. Learn how to detect and fix XSS in Windsurf projects.
Exposed API Keys in Windsurf Projects
Windsurf AI IDE generates integration code that often hardcodes API keys into frontend files. Identify and secure exposed secrets in Windsurf apps.
Insecure Headers in Windsurf Apps
Windsurf-generated apps typically ship without security headers, leaving them vulnerable to clickjacking, MIME sniffing, and other browser-based attacks.
Broken Authentication in Windsurf Apps
Windsurf-generated apps implement auth UIs but skip server-side authorization. Learn how attackers bypass client-side auth checks and how to fix it.
XSS in Replit Apps
Replit makes deployment instant, but apps built in its online IDE often contain XSS vulnerabilities. Learn how XSS appears in Replit projects and how to fix it.
Exposed API Keys in Replit Projects
Replit projects frequently leak API keys through public repos, client-side code, and misconfigured Secrets. Learn to detect and fix key exposure in Replit.
Insecure Headers in Replit Apps
Replit-hosted apps typically lack security headers, exposing them to clickjacking, MIME sniffing, and downgrade attacks. Configure proper headers on Replit.
Broken Authentication in Replit Apps
Replit apps frequently implement auth with insecure session handling and missing server-side access control. Detect and fix broken auth in Replit projects.
Missing Firestore Security Rules
Firestore databases without Security Rules expose all data to anyone with the public Firebase config. Detect missing rules and lock down your Firestore.
Exposed Secrets in Firebase Projects
Firebase API keys are public by design, but Admin SDK keys and service account JSON files are critical secrets. Learn the difference and protect real secrets.
Broken Authentication in Firebase Apps
Firebase Auth handles sign-in securely, but authorization mistakes in Security Rules and Cloud Functions let users access data they shouldn't. Fix broken auth.
XSS in Firebase-Powered Apps
Firebase apps store and retrieve user content from Firestore, creating XSS risks when rendered without sanitization. Secure your Firebase data rendering.
Missing RLS in Supabase
Missing RLS is the most common and critical Supabase vulnerability. Learn how to detect unprotected tables and implement proper security policies.
Exposed API Keys in Supabase Projects
Understand the difference between Supabase anon keys (safe) and service_role keys (critical). Detect and fix dangerous key exposure in your project.
Broken Authentication in Supabase Apps
Supabase Auth handles login securely, but authorization mistakes let users access data they shouldn't. Implement proper access control beyond authentication.
XSS in V0-Generated Components
V0 by Vercel generates React components from prompts, but the output can contain XSS vulnerabilities when rendering dynamic content. Fix unsafe patterns.
Exposed API Keys in V0 Code
V0 generates Next.js components that sometimes include placeholder API keys or client-side API call patterns. Prevent secret exposure when integrating V0 output.
Insecure Headers in V0-Built Apps
V0 generates UI components but not security infrastructure. Next.js apps built with V0 typically lack critical HTTP security headers. Learn how to configure them.
Exposed API Keys on Vercel
Vercel makes it easy to deploy Next.js apps, but the NEXT_PUBLIC_ prefix silently exposes environment variables to the browser. Secure your secrets on Vercel.
Insecure Headers on Vercel
Vercel provides HTTPS and basic protections but does not add security headers by default. Learn how to configure CSP, HSTS, and other headers for Vercel.
CORS Misconfiguration on Vercel
Vercel API routes and serverless functions often have permissive CORS settings that allow any origin to make authenticated requests. Detect and fix CORS issues.
Exposed API Keys on Netlify
Netlify environment variables can end up in client-side bundles through build-time injection. Identify exposed secrets and secure your Netlify deployment.
Insecure Headers on Netlify
Netlify sites often lack security headers because the _headers file or netlify.toml config is missing. Add CSP, HSTS, and other security headers to Netlify.
CORS Misconfiguration on Netlify
Netlify Functions and _headers files often set overly permissive CORS policies. Detect wildcard CORS and configure proper origin restrictions on Netlify.
XSS in Cursor-Generated Code
Cursor AI helps developers write code faster, but its suggestions can introduce XSS vulnerabilities. Spot and fix unsafe patterns in Cursor output.
Exposed API Keys in Cursor Projects
Cursor AI can accidentally commit API keys when generating code. Learn how to prevent key exposure in Cursor-assisted development workflows.
Exposed API Keys on Railway
Railway makes deployment easy with automatic env variable injection, but misconfigured frontend builds can expose secrets in client bundles. Secure keys.
Insecure Headers on Railway
Railway deployments typically lack security headers because the platform does not inject them automatically. Configure proper headers for Railway.
Automated Security Scanning
Don't wait for attackers to find these issues. Run an automated scan to check your app for all documented vulnerabilities.
Get Starter Scan