supabase-audit-buckets-public
π―SkillScannedfrom yoanbernabeu/supabase-pentest-skills
Audits and identifies publicly accessible Supabase storage buckets that may expose sensitive files or data to unauthorized viewers.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-audit-buckets-publicNeed more details? View full documentation on GitHub β
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Extracts and identifies potential Supabase service keys that might be exposed or vulnerable during a security assessment.