Security
for builders.
Paste a URL. Get a professional pentest report. In under 2 minutes. From $0.
Everyone's a developer now.
Almost nobody's a security expert.
Vibe coding tools let anyone ship a full-stack app in an afternoon. But the apps go live with exposed API keys, missing auth, broken access controls, and wide-open databases. Traditional pentests cost $10-50K and take weeks.
There's no fast, affordable way to know if your app is safe. Until now.
206 checks. 20 modules. Every angle.
The same checks a human pentester runs — in seconds instead of weeks.
Headers, TLS & DNS
HSTS, CSP, certificate issues, DNSSEC, SPF/DKIM/DMARC
Auth & Sessions
Broken login flows, weak JWTs, missing MFA, session fixation
Injection Testing
XSS, SQLi, SSRF, command injection, path traversal — real payloads
API & Database
Open Supabase tables, unsecured endpoints, IDOR, RLS bypass
Infrastructure
Leaked .env files, exposed admin panels, git repos, legacy APIs
Business Logic
Rate limit bypass, payment tampering, privilege escalation
AI / LLM Security
Prompt injection, output sanitization, RAG isolation
Platform-Specific
Vercel preview leaks, AWS S3 misconfig, Firebase rules, Cloudflare bypass
Scan. Detect. Remediate.
Three-layer engine. Zero credentials required. Completely non-destructive.
Deterministic
Instant. Zero cost.
HTTP probes, header checks, TLS analysis, DNS records. Pure signal, no AI needed.
Hybrid
Probe + AI filtering.
Real payloads test for injection, auth flaws, and misconfigs. Claude filters false positives.
AI Deep Analysis
Architecture-level insight.
Claude evaluates auth design, attack surface, and risks that automated tools miss entirely.
Stack-aware scanning with proof-by-exploitation
Auto-detects your stack and runs targeted checks. Every finding is verified — not theoretical.
CONFIRMED
Proven exploitable
POTENTIAL
Indicators found
Attack Chains
Multi-step paths
CISA KEV
Known exploited CVEs
Your report looks like this.
Severity ratings. Evidence. Plain English. Step-by-step remediation.
Click any finding to see the full details.
Supabase RLS Bypass — Data Accessible Without Authentication
“Anyone on the internet can read your entire customer database — names, emails, payment info — without logging in. They just need your Supabase URL, which is in your JavaScript.”
Evidence
**2 table(s) returned data** with the anon key via PostgREST
### api_keys (6 total rows)
Columns: id, org_id, name, key_hash, key_prefix, created_at
Sample: { org_id: "a1b2c3", name: "Production API Key", key_hash: "sha256:..." }
### users (142 total rows)
Columns: id, email, name, role, created_at
Sample: { email: "john@acme.com", name: "John Smith", role: "admin" }How to Fix
Enable RLS on all tables: ALTER TABLE api_keys ENABLE ROW LEVEL SECURITY; ALTER TABLE users ENABLE ROW LEVEL SECURITY; Then add policies that restrict access to authenticated users who own the data.
No Login Rate Limiting — Brute Force Possible
“An attacker can try thousands of password guesses per minute on your login page. There's nothing stopping them from breaking into accounts with weak passwords.”
Evidence
Login endpoint: /api/auth/login Sent 30 rapid POST requests Responses: [200, 200, 200, 200, 200, ...] 429 responses: 0/30 No rate limiting headers detected. No account lockout after 30 failed attempts.
How to Fix
Add rate limiting to your login endpoint: - Max 5 failed attempts per 15 minutes per IP - Return HTTP 429 after limit reached - Consider adding CAPTCHA after 3 failures
Missing Content Security Policy — XSS Risk Elevated
“Your site has no rules about what scripts can run. If an attacker finds any way to inject JavaScript, it will execute with full access to your users' sessions and data.”
Evidence
No Content-Security-Policy header found. Response headers: strict-transport-security: max-age=63072000 x-frame-options: DENY x-content-type-options: nosniff content-security-policy: (not set)
How to Fix
Add a Content-Security-Policy header. Start with: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self' https://*.supabase.co;
+ 31 more findings across 20 categories
Attack chains, executive summary, downloadable AI report
The vibe coding era changed everything.
The barrier to building software has never been lower. The barrier to building secure software hasn't moved.
Before Vibe Coding
- -Devs understood their auth code
- -Security reviews happened at scale-up
- -Pentests were proportional to team size
- -RLS was configured by backend devs
After Vibe Coding
- !Auth is copy-pasted from AI suggestions
- !Apps go from idea to production in hours
- !Solo founders ship enterprise attack surfaces
- !RLS is skipped because the AI didn't add it
Simple pricing. Real results.
Start free. Upgrade when you need deeper coverage.
206-check scan, PDF report, severity ratings, remediation steps.
- 206 security checks
- PDF report
- Remediation steps
Authenticated testing, deep recon, attack chain analysis.
- Everything in Express
- Authenticated testing
- Attack chain analysis
- Deep reconnaissance
Human-led pentest, custom remediation plan, compliance prep.
- Human security expert
- Custom remediation plan
- Compliance prep