supabase-audit-auth-config
๐ฏSkillfrom yoanbernabeu/supabase-pentest-skills
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx vibeindex add yoanbernabeu/supabase-pentest-skills --skill supabase-audit-auth-confignpx skills add yoanbernabeu/supabase-pentest-skills --skill supabase-audit-auth-config~/.claude/skills/supabase-audit-auth-config/SKILL.mdSKILL.md
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Audits and tests Supabase Remote Procedure Calls (RPCs) for potential security vulnerabilities, unauthorized access risks, and improper function permissions.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Scans Supabase applications to detect potential security vulnerabilities, configuration weaknesses, and exposed sensitive information during initial reconnaissance and threat assessment stages.