supabase-audit-realtime
π―SkillScannedfrom yoanbernabeu/supabase-pentest-skills
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-audit-realtimeNeed more details? View full documentation on GitHub β
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Extracts and validates URLs from a Supabase application to identify potential security risks or exposed endpoints during a penetration testing assessment.
Extracts the anonymous authentication key from a Supabase project to identify potential security vulnerabilities in client-side access configurations.