Security
for builders.

Paste a URL. Get a professional pentest report. In under 2 minutes. From $0.

206
security checks
<2m
scan time
94%
pentest match
$0
to start

Everyone's a developer now.
Almost nobody's a security expert.

Vibe coding tools let anyone ship a full-stack app in an afternoon. But the apps go live with exposed API keys, missing auth, broken access controls, and wide-open databases. Traditional pentests cost $10-50K and take weeks.

There's no fast, affordable way to know if your app is safe. Until now.

206 checks. 20 modules. Every angle.

The same checks a human pentester runs — in seconds instead of weeks.

Headers, TLS & DNS

HSTS, CSP, certificate issues, DNSSEC, SPF/DKIM/DMARC

Auth & Sessions

Broken login flows, weak JWTs, missing MFA, session fixation

Injection Testing

XSS, SQLi, SSRF, command injection, path traversal — real payloads

API & Database

Open Supabase tables, unsecured endpoints, IDOR, RLS bypass

Infrastructure

Leaked .env files, exposed admin panels, git repos, legacy APIs

Business Logic

Rate limit bypass, payment tampering, privilege escalation

AI / LLM Security

Prompt injection, output sanitization, RAG isolation

Platform-Specific

Vercel preview leaks, AWS S3 misconfig, Firebase rules, Cloudflare bypass

Scan. Detect. Remediate.

Three-layer engine. Zero credentials required. Completely non-destructive.

1

Deterministic

Instant. Zero cost.

HTTP probes, header checks, TLS analysis, DNS records. Pure signal, no AI needed.

2

Hybrid

Probe + AI filtering.

Real payloads test for injection, auth flaws, and misconfigs. Claude filters false positives.

3

AI Deep Analysis

Architecture-level insight.

Claude evaluates auth design, attack surface, and risks that automated tools miss entirely.

Stack-aware scanning with proof-by-exploitation

Auto-detects your stack and runs targeted checks. Every finding is verified — not theoretical.

CONFIRMED

Proven exploitable

POTENTIAL

Indicators found

Attack Chains

Multi-step paths

CISA KEV

Known exploited CVEs

Your report looks like this.

Severity ratings. Evidence. Plain English. Step-by-step remediation.
Click any finding to see the full details.

CRITICALDatabase SecurityCWE-8629.8

Supabase RLS Bypass — Data Accessible Without Authentication

Anyone on the internet can read your entire customer database — names, emails, payment info — without logging in. They just need your Supabase URL, which is in your JavaScript.

Evidence

**2 table(s) returned data** with the anon key via PostgREST

### api_keys (6 total rows)
Columns: id, org_id, name, key_hash, key_prefix, created_at
Sample: { org_id: "a1b2c3", name: "Production API Key", key_hash: "sha256:..." }

### users (142 total rows)
Columns: id, email, name, role, created_at
Sample: { email: "john@acme.com", name: "John Smith", role: "admin" }

How to Fix

Enable RLS on all tables:

ALTER TABLE api_keys ENABLE ROW LEVEL SECURITY;
ALTER TABLE users ENABLE ROW LEVEL SECURITY;

Then add policies that restrict access to authenticated users who own the data.
HIGHAuth & SessionsCWE-3077.5

No Login Rate Limiting — Brute Force Possible

An attacker can try thousands of password guesses per minute on your login page. There's nothing stopping them from breaking into accounts with weak passwords.

Evidence

Login endpoint: /api/auth/login
Sent 30 rapid POST requests
Responses: [200, 200, 200, 200, 200, ...]
429 responses: 0/30

No rate limiting headers detected.
No account lockout after 30 failed attempts.

How to Fix

Add rate limiting to your login endpoint:

- Max 5 failed attempts per 15 minutes per IP
- Return HTTP 429 after limit reached
- Consider adding CAPTCHA after 3 failures
MEDIUMHeaders & TLSCWE-6935.3

Missing Content Security Policy — XSS Risk Elevated

Your site has no rules about what scripts can run. If an attacker finds any way to inject JavaScript, it will execute with full access to your users' sessions and data.

Evidence

No Content-Security-Policy header found.

Response headers:
  strict-transport-security: max-age=63072000
  x-frame-options: DENY
  x-content-type-options: nosniff
  content-security-policy: (not set)

How to Fix

Add a Content-Security-Policy header. Start with:

default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self' https://*.supabase.co;

+ 31 more findings across 20 categories

Attack chains, executive summary, downloadable AI report

The vibe coding era changed everything.

The barrier to building software has never been lower. The barrier to building secure software hasn't moved.

Before Vibe Coding

  • -Devs understood their auth code
  • -Security reviews happened at scale-up
  • -Pentests were proportional to team size
  • -RLS was configured by backend devs

After Vibe Coding

  • !Auth is copy-pasted from AI suggestions
  • !Apps go from idea to production in hours
  • !Solo founders ship enterprise attack surfaces
  • !RLS is skipped because the AI didn't add it

Simple pricing. Real results.

Start free. Upgrade when you need deeper coverage.

Express Scan
$0/ free

206-check scan, PDF report, severity ratings, remediation steps.

  • 206 security checks
  • PDF report
  • Remediation steps
Scan free
Most Popular
Full Scan
$99/ scan

Authenticated testing, deep recon, attack chain analysis.

  • Everything in Express
  • Authenticated testing
  • Attack chain analysis
  • Deep reconnaissance
Get full scan
Consulting
$3K+

Human-led pentest, custom remediation plan, compliance prep.

  • Human security expert
  • Custom remediation plan
  • Compliance prep
Contact us

Every app deserves
a security audit.

Now every app can get one.