The fastest way to identify and fix security risks in your Supabase environment – before they reach production.
The Supabase RLS Scanner is an open-source Supabase security audit tool designed to detect misconfigurations, prevent data exposure, privilege escalation, and unauthorized access in your Supabase database and API.
Supabase makes it easy to ship production apps quickly. As an open source Firebase alternative, it accelerates development – but default configurations can unintentionally expose data.
This scanner helps you identify authentication, storage, RLS, and API security risks before they become real-world vulnerabilities.
Developed based on real security audits and penetration tests, it delivers actionable findings with straightforward remediation guidance – no complex setup or infrastructure required.
This security tool is open source and developed for security engineers, developers, and DevOps professionals.
You can inspect the code, use it locally, and customize it for your use case.
Star the repository to support the project and stay updated with improvements.
The scanner performs targeted checks specifically for Supabase environments:
Detect overly permissive Supabase RLS (Row Level Security) policies that could allow unauthorized data access.
Identify storage buckets that are unintentionally public or exposed to unauthorized users.
Find weak or improperly configured authentication settings in your Supabase project.
Detect overly permissive service_role permissions that could lead to privilege escalation.
Identify API endpoints and configurations that may expose sensitive data or functionality.
Discover insecure or unintended access paths in your Supabase environment.
Each finding includes severity classification and step-by-step remediation guidance.
While working on cloud and application security projects, we noticed that the same issues in Supabase kept appearing in startups and scaling SaaS companies.
Some of these issues included:
These issues were typically found during audits and penetration tests.
We created this open-source project to help teams identify and remediate these issues early on.
During a security review of a multi-tenant SaaS platform using Supabase, we identified:
Identify Supabase security risks directly within your testing workflow.
Download the extension and load it into Burp Suite using the Extensions tab. The setup takes less than a minute and requires no infrastructure changes.
View on GitHubAs Burp captures HTTP traffic, the extension automatically detects Supabase endpoints, configuration objects, and exposed JWT tokens — including high-risk service_role credentials.
Use the built-in "Test RLS" feature to actively evaluate database tables for Row Level Security misconfigurations. The extension performs controlled tests to identify unauthorized read and write access.
The scanner classifies discovered data by severity and highlights potential exposure of credentials, financial records, personal data, and authentication artifacts.
Leverage Burp's native reporting capabilities alongside the extension findings to prioritize remediation and eliminate dangerous access paths before attackers exploit them.
Quickly identify RLS bypass opportunities, exposed tokens, and unauthorized data access during application security assessments.
Automate Supabase discovery and uncover high-impact vulnerabilities that often lead to critical findings.
Enhance testing coverage with targeted checks designed specifically for Supabase attack surfaces.
Simulate real-world attack paths by validating privilege boundaries and detecting sensitive data exposure.
Proactively test applications before release to ensure misconfigured policies do not expose production data.
The extension helps uncover high-impact vulnerabilities that commonly lead to data breaches:
Each finding is enriched with severity indicators so security teams can quickly focus on exploitable risks.
Identify Supabase security risks directly within your testing workflow.
We provide production Supabase security audits, RLS policy reviews, and compliance-driven assessments.
Yes. This Supabase RLS scanner is open source and free to use. You can inspect the code, run it locally, and customize it for your security testing workflow.
No. It is read-only and does not alter your Supabase database or Supabase API configuration.
The Supabase Security Scanner does not require any credentials or access. If your website is running on Supabase, the tool automatically detects the environment and proceeds with the next steps. No sensitive data or configuration needs to be provided.
Yes. The scanner is safe to run against production because it is fully read-only and does not alter any data or configurations.
It can detect:
No. The results include explanations and remediation steps, so engineering teams can quickly address security issues.
It's recommended to run it:
Yes. Our team can provide deeper analysis and focused Supabase security reviews if needed.
Yes. Row Level Security (RLS) is essential for production Supabase apps, especially multi-tenant applications. RLS ensures users can only access the data they are authorized to see.
RLS stands for Row Level Security. It allows you to define policies that control which rows a user can read, insert, update, or delete based on their identity - essentially database-level authorization.
You can view usage in the Supabase Dashboard → Project → Usage/Billing. There you can see:
Errors can be checked in:
You can also integrate external monitoring tools.
Supabase is an open-source backend platform that provides:
It allows developers to build backend infrastructure quickly without managing servers.
Supabase is SQL-based because it uses PostgreSQL. It also supports JSON columns and flexible schemas, offering some NoSQL-like capabilities.
Supabase is not an alternative to SQL - it uses SQL (Postgres). Supabase provides a complete backend platform around the database, including auth, APIs, and tooling: