supabase-extract-db-string
π―SkillScannedfrom yoanbernabeu/supabase-pentest-skills
Extracts and identifies potential database connection strings or sensitive connection-related information within a Supabase application during security testing.
Same repository
yoanbernabeu/supabase-pentest-skills(25 items)
Installation
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-extract-db-stringNeed more details? View full documentation on GitHub β
More from this repository10
Audits and tests Row Level Security (RLS) policies in Supabase databases to identify potential authorization vulnerabilities and misconfigurations.
Supabase security auditing skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Provides comprehensive guidance and troubleshooting assistance for Supabase-related security testing and pentest scenarios.
Audits and evaluates Supabase authentication configuration settings for potential security vulnerabilities and misconfigurations.
Audits and monitors Supabase Realtime subscriptions for potential security vulnerabilities and unauthorized access patterns.
Supabase security report generation skill from the Supabase Pentest Skills collection of 24 AI agent skills covering detection, key extraction, RLS testing, IDOR detection, storage audit, evidence collection, and comprehensive reporting
Lists and enumerates all database tables in a Supabase project, providing a comprehensive overview of the database schema for security auditing purposes.
Audits and identifies potential security vulnerabilities in Supabase database functions, checking for misconfigurations, improper access controls, and potential injection risks.
Extracts and identifies potential Supabase service keys that might be exposed or vulnerable during a security assessment.
Audits and tests Supabase Remote Procedure Calls (RPCs) for potential security vulnerabilities, unauthorized access risks, and improper function permissions.