
π―Skills25
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Extracts and identifies potential Supabase service keys that might be exposed or vulnerable during a security assessment.
Audits and tests Supabase Remote Procedure Calls (RPCs) for potential security vulnerabilities, unauthorized access risks, and improper function permissions.
Extracts the anonymous authentication key from a Supabase project to identify potential security vulnerabilities in client-side access configurations.
Extracts and validates URLs from a Supabase application to identify potential security risks or exposed endpoints during a penetration testing assessment.
Lists and audits all Supabase storage buckets, identifying potential security misconfigurations and unauthorized access risks.
Audits and identifies publicly accessible Supabase storage buckets that may expose sensitive files or data to unauthorized viewers.
Supabase JWT extraction skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Supabase audit tables read skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Scans Supabase applications to detect potential security vulnerabilities, configuration weaknesses, and exposed sensitive information during initial reconnaissance and threat assessment stages.
Audits and tests Supabase authentication signup processes for potential security vulnerabilities, including weak password policies, improper validation, and potential registration bypass techniques.
Audits and analyzes Supabase authentication users for potential security vulnerabilities, misconfigurations, and unauthorized access risks.
Supabase security report comparison skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Supabase storage buckets read audit skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Supabase authenticated endpoint audit skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Collects and documents security audit evidence, findings, and artifacts during a Supabase application penetration testing process.
Skill