supabase-audit-rls
π―SkillScannedfrom yoanbernabeu/supabase-pentest-skills
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-audit-rlsNeed more details? View full documentation on GitHub β
More from this repository10
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Audits and tests Supabase Remote Procedure Calls (RPCs) for potential security vulnerabilities, unauthorized access risks, and improper function permissions.
Extracts and validates URLs from a Supabase application to identify potential security risks or exposed endpoints during a penetration testing assessment.