AI-Powered Security Testing

Automated Security Testing
for Your Supabase APIs

Find RLS bypasses, exposed data, and authentication flaws before attackers do. Our AI-powered penetration testing probes your Supabase APIs in minutes, not days.

3 free pen tests included. No credit card required.

Supabase Security Vulnerabilities Are Easy to Miss

Row Level Security (RLS) misconfigurations are the most common cause of data breaches in Supabase projects. One forgotten policy can expose your entire user database.

RLS Misconfigurations

A single table without RLS enabled can expose thousands of user records to anyone with your public API URL.

Exposed Endpoints

Supabase auto-generates REST endpoints for every table. Sensitive tables may be exposed without you realizing it.

Auth Bypasses

Weak RLS policies can allow users to access data belonging to other accounts, violating data privacy.

Automated Testing in 3 Simple Steps

Get comprehensive security insights without complex setup or security expertise.

1

Connect

Enter your Supabase project URL and optionally provide your anon key for deeper testing. That's all we need to get started.

2

Analyze

Our AI agent automatically tests your API endpoints for RLS bypasses, data exposure, CORS issues, and authentication flaws. Takes 1-3 minutes.

3

Fix

Get actionable findings with severity ratings, evidence of the vulnerability, and step-by-step remediation guidance.

Comprehensive Security Coverage

We test for the most common and dangerous Supabase security vulnerabilities.

CRITICAL

RLS Bypass Detection

Discovers Row Level Security misconfigurations that could allow unauthorized access to user data.

CRITICAL

Exposed PII & Sensitive Data

Identifies tables returning personal information like emails, phone numbers, or payment details.

CRITICAL

Unauthenticated Data Access

Detects tables accessible without authentication that should require login.

HIGH

Authentication Bypasses

Tests for auth weaknesses, exposed admin routes, and weak session handling.

HIGH

Storage Bucket Exposure

Checks for public storage buckets containing private user files.

MEDIUM

CORS Misconfigurations

Identifies wildcard CORS policies that allow any website to access your API.

Why CursorGuard Pen Testing?

Built specifically for Supabase developers who want actionable security insights.

Developer-Actionable

Only reports issues you can actually fix in your Supabase dashboard or application code. No noise from platform-level configurations.

Non-Destructive Testing

Read-only security testing that is safe to run on production. We never modify data or disrupt your application.

Results in Minutes

Get comprehensive security findings in 1-3 minutes. Watch progress in real-time as tests execute.

Supabase-Specific

Purpose-built for Supabase projects. Tests RLS policies, storage buckets, and API endpoints specific to the Supabase architecture.

See What We Find

Real examples of the security findings our pen testing uncovers.

CRITICAL

RLS Disabled on Users Table

The "users" table has Row Level Security disabled, exposing all user records to anyone with the anon key.

Evidence

curl response returned 847 user records including email addresses

Recommendation

Enable RLS on the users table and create appropriate policies for authenticated access.

HIGH

Exposed Email Addresses

The "profiles" table returns email addresses in the public API response without authentication.

Evidence

GET /rest/v1/profiles?select=* returned email field for all users

Recommendation

Restrict the email column with RLS or remove it from the public schema.

MEDIUM

Wildcard CORS Configuration

CORS is configured to allow requests from any origin, potentially enabling cross-site attacks.

Evidence

Access-Control-Allow-Origin: * in response headers

Recommendation

Configure CORS in Supabase dashboard to only allow your application domains.

Frequently Asked Questions

Is this safe to run on production?

Yes, absolutely. Our penetration testing is completely non-destructive and read-only. We only make GET requests and OPTIONS requests to probe your API. We never modify, delete, or create any data in your database.

Do I need to provide my anon key?

The anon key is optional but recommended. Without it, we can only test basic CORS configuration and endpoint discovery. With the anon key, we can perform deeper testing of RLS policies, table enumeration, and data exposure. The anon key is designed to be public, so sharing it is safe.

How long does a security test take?

Most tests complete in 1-3 minutes. You can watch the progress in real-time as our AI agent executes various security tests against your Supabase API.

What if no vulnerabilities are found?

That's great news! It means your Supabase security configuration is following best practices. We still provide a summary of what was tested and verified, giving you confidence in your security posture.

Does this work with databases other than Supabase?

Currently, our API security testing is purpose-built for Supabase projects. It specifically tests Supabase's RLS policies, storage buckets, and REST API patterns. We may support other platforms in the future.

How is this different from code scanning?

Code scanning (like Semgrep) analyzes your source code for vulnerabilities. API penetration testing actually probes your live API to find runtime misconfigurations. Both are important - code scanning catches bugs before deployment, pen testing catches configuration issues in production.

Can I schedule automatic security tests?

Automated scheduling is available on our Enterprise plan. This allows you to run security tests on a regular cadence and get alerted when new vulnerabilities are detected.

Secure Your Supabase APIs Today

Start with 3 free pen tests. No credit card required.

Start Free Testing

Join developers who trust CursorGuard to secure their Supabase projects.