supabase-audit-functions
π―SkillScannedfrom yoanbernabeu/supabase-pentest-skills
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-audit-functionsNeed more details? View full documentation on GitHub β
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Extracts the anonymous authentication key from a Supabase project to identify potential security vulnerabilities in client-side access configurations.
Extracts and identifies potential Supabase service keys that might be exposed or vulnerable during a security assessment.