supabase-audit-tables-list
๐ฏSkillfrom yoanbernabeu/supabase-pentest-skills
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx vibeindex add yoanbernabeu/supabase-pentest-skills --skill supabase-audit-tables-listnpx skills add yoanbernabeu/supabase-pentest-skills --skill supabase-audit-tables-list~/.claude/skills/supabase-audit-tables-list/SKILL.mdSKILL.md
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Audits and tests Supabase Remote Procedure Calls (RPCs) for potential security vulnerabilities, unauthorized access risks, and improper function permissions.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
24 AI agent skills for professional security auditing of Supabase applications, covering detection, API key extraction, RLS testing, IDOR detection, storage audit, and comprehensive reporting.
Lists and audits all Supabase storage buckets, identifying potential security misconfigurations and unauthorized access risks.