...

Supabase RLS Scanner

Supabase RLS Scanner - Open-Source Supabase Security Audit Tool

The fastest way to identify and fix security risks in your Supabase environment – before they reach production.

The Supabase RLS Scanner is an open-source Supabase security audit tool designed to detect misconfigurations, prevent data exposure, privilege escalation, and unauthorized access in your Supabase database and API.

Supabase makes it easy to ship production apps quickly. As an open source Firebase alternative, it accelerates development – but default configurations can unintentionally expose data.

This scanner helps you identify authentication, storage, RLS, and API security risks before they become real-world vulnerabilities.

Developed based on real security audits and penetration tests, it delivers actionable findings with straightforward remediation guidance – no complex setup or infrastructure required.

Our web security assessment approach combines automated scanning with manual testing to provide the most thorough evaluation of your web applications and APIs.

Open Source and Community Driven

This security tool is open source and developed for security engineers, developers, and DevOps professionals.

Free to use and modify

Security checks are transparent

No vendor lock-in

Community contributions are welcome

You can inspect the code, use it locally, and customize it for your use case.
Star the repository to support the project and stay updated with improvements.

What the Tool Checks

The scanner performs targeted checks specifically for Supabase environments:

Too Permissive RLS Policies

Detect overly permissive Supabase RLS (Row Level Security) policies that could allow unauthorized data access.

Public or Exposed Storage Buckets

Identify storage buckets that are unintentionally public or exposed to unauthorized users.

Weak Authentication Settings

Find weak or improperly configured authentication settings in your Supabase project.

Overly Permissive service_role

Detect overly permissive service_role permissions that could lead to privilege escalation.

Supabase API Exposure Risks

Identify API endpoints and configurations that may expose sensitive data or functionality.

Insecure Access Paths

Discover insecure or unintended access paths in your Supabase environment.

Each finding includes severity classification and step-by-step remediation guidance.

Why We Built This

While working on cloud and application security projects, we noticed that the same issues in Supabase kept appearing in startups and scaling SaaS companies.

Some of these issues included:

These issues were typically found during audits and penetration tests.

We created this open-source project to help teams identify and remediate these issues early on.

CASE STUDY

Real-World Example: Prevented Cross-Tenant Data Exposure

During a security review of a multi-tenant SaaS platform using Supabase, we identified:

Core Features of Supabase Scanner

Supabase Database Security

Authentication Configuration

Realtime Endpoints

Storage Exposure

Edge Functions

How It Works

Identify Supabase security risks directly within your testing workflow.

1

Install the Extension

Download the extension and load it into Burp Suite using the Extensions tab. The setup takes less than a minute and requires no infrastructure changes.

View on GitHub
2

Passively Discover Supabase Exposure

As Burp captures HTTP traffic, the extension automatically detects Supabase endpoints, configuration objects, and exposed JWT tokens — including high-risk service_role credentials.

3

Trigger Active RLS Testing

Use the built-in "Test RLS" feature to actively evaluate database tables for Row Level Security misconfigurations. The extension performs controlled tests to identify unauthorized read and write access.

4

Analyze Sensitive Data Exposure

The scanner classifies discovered data by severity and highlights potential exposure of credentials, financial records, personal data, and authentication artifacts.

5

Report and Remediate

Leverage Burp's native reporting capabilities alongside the extension findings to prioritize remediation and eliminate dangerous access paths before attackers exploit them.

Who Should Use This

Penetration Testers

Quickly identify RLS bypass opportunities, exposed tokens, and unauthorized data access during application security assessments.

Bug Bounty Hunters

Automate Supabase discovery and uncover high-impact vulnerabilities that often lead to critical findings.

Security Consultants

Enhance testing coverage with targeted checks designed specifically for Supabase attack surfaces.

Red Teams

Simulate real-world attack paths by validating privilege boundaries and detecting sensitive data exposure.

Engineering Teams Using Supabase

Proactively test applications before release to ensure misconfigured policies do not expose production data.

Sample Findings

The extension helps uncover high-impact vulnerabilities that commonly lead to data breaches:

Exposed anon or service_role JWT tokens in HTTP responses
Row Level Security (RLS) policy bypass enabling unauthorized database access
Publicly accessible tables through PostgREST introspection
Unauthorized INSERT or SELECT permissions
Sensitive data exposure including credentials, financial records, and personal information
Supabase configuration leaks in frontend applications

Each finding is enriched with severity indicators so security teams can quickly focus on exploitable risks.

How It Works?

Identify Supabase security risks directly within your testing workflow.

Need a professional Supabase security review?

We provide production Supabase security audits, RLS policy reviews, and compliance-driven assessments.

FAQs