Securie for FastAPI
Securie covers FastAPI's Depends-based auth, Pydantic model validation, and the common pitfalls of async Python API development. Jinja2 XSS, missing input-validation, and SQLAlchemy injection are all detected.
Why it matters for FastAPI
Install on your FastAPI repo. Every router is reviewed for dependency-injection auth coverage.
- FastAPI + Starlette-native
- Validates Depends() auth chains across routers
- Detects Jinja2 XSS, SQLAlchemy raw-SQL injection, unsafe deserialization
- Checks requirements.txt for vulnerable dependencies
Common bugs we catch in FastAPI
Missing auth Depends() on routers
FastAPI auth via Depends() is opt-in per router. Missing Depends = unauthenticated endpoint.
Read the guide →Pydantic v2 field_validator bypass
Complex Pydantic validators sometimes allow input that should be rejected. Securie fuzz-tests model boundaries.
SQLAlchemy text() with format string
Using text() with Python f-strings is SQL injection. Securie detects the pattern.
Install in under a minute
- Install the Securie GitHub App on your FastAPI repo
- Securie detects pyproject.toml or requirements.txt
- Push any PR. Review findings within minutes.
FastAPI is a trademark of its maintainers. Securie is independent.