Securie site index
Every public Securie security resource in one place: tools, guides, CVEs, leak playbooks, comparisons, checklists, research, legal pages, and disclosure documents.
Core
Waitlist, research, and company pages.
Guides
Deep dives on the bug classes AI-built apps actually ship.
All guidesSupabase RLS misconfiguration — detect, exploit, and fixBroken Object-Level Authorization (BOLA) in Next.js appsInsecure Direct Object Reference (IDOR) — what it is and how to prevent itLeaked API keys in Next.js — the most common vibe-coded mistakePrompt injection in AI apps — how attackers hijack your agentsVibe coding security risks — the 2026 field guideRate limiting in Next.js — the correct way in 2026Webhook signature verification — Stripe, GitHub, Clerk, everyoneCORS misconfiguration — how `Access-Control-Allow-Origin: *` breaks your appSecure cookies in Next.js — HttpOnly, Secure, SameSite explainedSecure file uploads in Next.js — content type, size, storage, servingSSRF prevention in Node.js — validate the resolved IP, not the URL stringSQL injection prevention in Node.js — parametrize everythingCSRF protection in Next.js — when you need it, when you don'tXSS in React — dangerouslySetInnerHTML and the specific bugs we seeJWT verification — the five ways apps get it wrongSecrets management — where to actually store your API keysSecurity headers for Next.js — CSP, HSTS, and the full listOAuth + OIDC security — the PKCE and state checks you cannot skipPassword hashing — Argon2id is the answer, here is howAPI key rotation — how to rotate without downtimeSession security — revocation, idle timeout, rotationGDPR for indie SaaS — the minimum viable compliance playbookEU AI Act for AI-built apps — what to ship before August 2026CCPA / CPRA for SaaS — what you actually have to doHIPAA for startups — when you need it, when you don't, how to start
Questions
Exact-match answers for founder security searches.
All questionsDo I need SOC 2 as a startup?How much does SOC 2 cost for a startup?How long does SOC 2 take?What is the difference between SOC 2 Type 1 and Type 2?Is my Supabase public?How do I check if my API key leaked on GitHub?What happens if my Stripe key leaks?How do I rotate an OpenAI API key after it leaks?Is Lovable secure?Is Bolt.new secure?Will my Lovable app get hacked?How do I know if my website is secure?What is Supabase RLS and do I need it?Do I need GDPR compliance?Is AI-generated code safe?How do I secure a Next.js app?Is my Next.js app vulnerable to CVE-2025-29927?Can ChatGPT hack my app?What do I do after a data breach at my startup?Is my Firebase public?How do attackers find leaked API keys?What is a CSP header and do I need it?Do I need a WAF?How much does a pentest cost?Should I use Clerk or Auth0?What is HIPAA compliance for a SaaS?Can I get sued for a data breach?How do I pass a security questionnaire?What security does my SaaS actually need?How do I fix a Supabase leak?Is my Vercel deploy leaking secrets?What is a bug bounty?What are the best security tools for indie developers in 2026?Should I use passkeys for my app?Is my password leaked?What is a 2FA bypass attack?How do I add rate limiting to my Next.js app?What should I put in my security.txt file?How do I audit an AI agent's security?Do AI coding tools expose my private code?What is shadow AI?
CVEs And Leaks
Plain-English vulnerability notes and credential rotation playbooks.
CVE libraryCVE-2025-29927 — Next.js middleware authentication bypassCVE-2025-48757 — Lovable project-enumeration exposureCVE-2024-39338 — Axios SSRF via absolute URLCVE-2024-28849 — Follow-Redirects credential forwardingCVE-2024-52798 — path-to-regexp ReDoSCVE-2025-27210 — Node.js HTTP request-smugglingCVE-2024-46982 — Next.js cache poisoning via path confusionCVE-2024-34351 — Next.js Server Actions SSRFCVE-2024-47831 — Next.js image optimization DoSCVE-2024-51479 — Next.js authorization bypass via static path rewriteCVE-2024-4067 — micromatch ReDoSCVE-2024-4068 — braces ReDoS (build-time DoS)CVE-2024-45590 — body-parser DoS via deeply nested URL-encoded inputCVE-2024-43796 — Express open redirectCVE-2024-43799 — send directory traversalCVE-2024-43800 — serve-static path confusionCVE-2024-37890 — ws WebSocket DoSCVE-2024-28176 — jose (JWT library) compressed-payload DoSCVE-2024-29415 — ip SSRF allowlist bypassCVE-2023-26136 — tough-cookie prototype pollutionCVE-2024-21538 — cross-spawn ReDoSCVE-2024-47068 — Rollup dev-mode XSSCVE-2023-49090 — Vite arbitrary file readCVE-2024-47875 — DOMPurify bypass on sandboxed iframesCVE-2024-28863 — node-tar DoS via malformed headerCVE-2024-22195 — Jinja2 XSS via xmlattr filterCVE-2023-44270 — PostCSS newline parsing bypassCVE-2024-35255 — Azure Identity library credential leakageCVE-2024-27982 — Node.js HTTP request-smuggling via space in Content-LengthCVE-2024-27983 — Node.js HTTP/2 DoS via unauthenticated reset-stream floodCVE-2024-30171 — Bouncy Castle timing side-channelCVE-2024-24549 — Apache Tomcat HTTP/2 DoSCVE-2024-21490 — Angular.js ReDoS in inline formatterCVE-2024-45296 — path-to-regexp outage-backtracking variantCVE-2024-32421 — Next.js race condition in cached fetchCVE-2024-39884 — Apache HTTP Server cache-key confusionCVE-2025-24840 — supabase-js session-refresh race conditionCVE-2024-21656 — Turborepo path traversal in cached outputsCVE-2024-42005 — Django QuerySet SQL injection via JSON key lookupsCVE-2024-45231 — Django reset-password user enumerationCVE-2024-38475 — Apache httpd mod_rewrite file-system escapeCVE-2024-32002 — Git RCE via case-insensitive filesystem symlinkCVE-2024-37891 — urllib3 proxy-auth credential leak through redirectsCVE-2024-6345 — Python setuptools RCE via package_indexCVE-2024-39689 — certifi removed GLOBALTRUST CA without updating pinned certsCVE-2024-29025 — Netty HttpPostRequestDecoder DoSCVE-2024-47178 — Nuxt devtools prototype pollutionCVE-2024-41818 — fast-xml-parser ReDoSCVE-2024-50379 — Apache Tomcat JSP TOCTOU RCECVE-2024-56204 — Composer cache-poisoning RCECVE-2024-47076 — CUPS IPP request input validationCVE-2025-0411 — 7-Zip Mark-of-the-Web bypassCVE-2024-39338 — Axios protocol-confusion SSRFCVE-2024-27980 — Node.js Windows command injection via child_processCVE-2024-30260 — undici header scrubbing bypassCVE-2024-22257 — Spring Security authorization bypassCVE-2024-27281 — Ruby RDoc command injection via documentation buildCVE-2024-7254 — Protocol Buffers StackOverflow DoSLeak playbooksLeaked OpenAI API key — what attackers do and how to rotateLeaked Supabase service-role key — worst-case exposureLeaked Stripe secret key — what you owe the attackerLeaked AWS access-key — billing, S3, and lateral movementLeaked Anthropic API key — Claude access and the billLeaked GitHub PAT — repo exfiltration and supply-chain riskLeaked Stripe restricted key — scoped damage, still rotateLeaked Twilio credentials — SMS fraud at scaleLeaked SendGrid API key — phishing via your domainLeaked Mailgun API key — same phishing risk as SendGridLeaked Resend API key — modern sender, same riskLeaked Google Cloud service-account key — treat as full GCP compromiseLeaked Azure Storage connection string — full blob accessLeaked Firebase Admin SDK — bypasses every security rule you wroteLeaked Clerk secret key — impersonate any userLeaked Auth0 Management API token — full tenant compromiseLeaked Slack bot token — data exfiltration + social engineeringLeaked Discord bot token — server compromiseLeaked Notion integration secret — workspace data exfiltrationLeaked Linear API key — ticket exfiltrationLeaked Datadog keys — observability pipeline compromiseLeaked Sentry DSN vs auth token — different risksLeaked PostHog keys — analytics pipeline compromiseLeaked Vercel access token — deploy access + secret leakLeaked Netlify personal access token — deploy + environment compromiseLeaked npm access token — supply-chain attack riskLeaked Cloudflare API token — DNS + CDN compromise
Comparisons And Alternatives
Head-to-head pages for existing security tools.
All comparisonsSecurie vs Snyk — honest comparison (2026)Securie vs GitHub Advanced Security (GHAS) — 2026 comparisonSecurie vs Semgrep — 2026 comparisonAll alternativesLooking for a Snyk alternative? Here's an honest comparison.GitHub Advanced Security alternative — for stacks GHAS doesn't cover wellSemgrep alternative — beyond pattern-matchingAikido alternative — free during early access instead of $250/moSocket.dev alternative — supply-chain + application security combinedLakera Guard alternative — LLM runtime guard vs root-cause securityVanta alternative for the security-execution partMobb alternative — broader auto-fix + sandbox verificationPixee alternative — broader scope than auto-fixJit alternative — DevSecOps orchestrator vs purpose-built AI-app tool
Stacks And Integrations
Framework, platform, and integration-specific security pages.
Securie for Next.jsSecurie for SupabaseSecurie for VercelSecurie for AstroSecurie for RemixSecurie for SvelteKitSecurie for NuxtSecurie for HonoSecurie for FastAPISecurie for DjangoSecurie for Ruby on RailsSecurie for FirebaseSecurie for ClerkAll stack playbooksNext.js + Supabase + Vercel security — the 2026 playbookNext.js + Postgres security — direct-to-database architectureRemix + Supabase security — loader / action modelSvelteKit + Supabase security — +page.server.ts and form-actionsNext.js + Clerk security — auth as a serviceNext.js + Firebase security — rules-first architectureAstro + Turso security — edge-SQL architectureRemix + PlanetScale security — MySQL-at-scale architectureNuxt + Firebase security — Nitro server + Firestore rulesHono + Cloudflare D1 security — edge-native SQL stackAll integrationsSecurie for GitHub — auto-scan every pull requestSecurie for Vercel — pre-deploy security gateSecurie for Slack — incident + finding notificationsSecurie for Discord — bot for indie foundersSecurie MCP Server — agent-native securitySecurie for Supabase — RLS validation + migration scanningSecurie for GitHub Actions — CI-native security gateSecurie for Cloudflare — Workers + Pages scanningSecurie for Netlify — function + env scanningSecurie for Claude Code — security-aware agent loopSecurie for Cursor — security review in your editorSecurie for Sentry — runtime exception correlation
Audiences And Scenarios
Pages for founder profiles, incidents, and security panic moments.
All audiencesSecurie for vibe coders — ship AI-built apps safelySecurie for non-technical founders — security without codeSecurie for solo founders — a security team that's 1/20 your sizeSecurie for first-time founders — your security co-founderSecurie for AI app builders — LLM, agent, and RAG securitySecurie for designers who code — security without engineeringSecurie for bootstrapped founders — security without venture capitalAll scenariosMy API key leaked on GitHub — what do I do?My Supabase database might be public — how do I check?My first enterprise deal needs SOC 2 — I've never done oneSomeone tweeted that my app is leaking data — what do I do?My app just hit Hacker News / Product Hunt — am I about to get breached?My OpenAI bill hit $12,000 overnight — how?I don't know if my app is safe — where do I start?All my code was written by AI — how do I trust it?Incident postmortemsMoltbook — 1.5M API keys exposed via Supabase misconfigurationSaaStr production database wiped by Replit AgentLovable — VibeScamming prompt-injection backdoorAmazon.com — 6-hour outage from AI-assisted deployXZ Utils backdoor — three years of social-engineering supply chain attackLog4Shell — the single most impactful CVE of the decadeevent-stream npm — maintainer takeover supply-chain attackColonial Pipeline — leaked VPN password halts East Coast fuel supplyArup — $25M stolen via deepfake CFO video callOkta — stolen service account token → support-system compromiseMOVEit — single SQL injection → hundreds of downstream breachesCVE-2025-29927 — Next.js middleware bypass mass exploitation
Regions And Industry
Market-specific security playbooks.
All regionsSecurity + privacy regulations in the United StatesSecurity + privacy regulations in the European UnionSecurity + privacy regulations in the United KingdomSecurity + privacy regulations in CanadaSecurity + privacy regulations in AustraliaSecurity + privacy regulations in IndiaSecurity + privacy regulations in BrazilSecurity + privacy regulations in SingaporeSecurity + privacy regulations in JapanSecurity + privacy regulations in South Korea简体中文 - Mainland China日本語 - Japan한국어 - South KoreaEspañol - Latinoamérica y EspañaDeutsch - Deutschland, Österreich und SchweizFrançais - France et marchés francophonesPortuguês do Brasil - Brasilहिन्दी - IndiaAll industriesB2B SaaS security — the 2026 buyer-facing baselineFintech security — PCI, SOC 2, and the specific threats that matterHealthcare security — HIPAA, BAAs, and AI in clinical contextE-commerce security — payment, PII, and fraud at scaleEdTech security — FERPA, COPPA, and student-data protectionMarketplace security — trust between strangers at scaleDeveloper-tool security — the product you sell IS the attack surfaceAI product security — the 2026 baseline
Safety, Glossary, Templates, And Checklists
Reference material for builders and security reviewers.
Safety assessmentsIs Lovable safe? Honest security assessment for Lovable-built appsIs Bolt.new safe? Security assessment for Bolt-built appsIs v0 safe? Security assessment for v0-generated appsIs Replit safe? Security assessment for Replit Agent appsIs Cursor safe? Security considerations for Cursor-assisted codeIs Windsurf safe? Security considerations for Windsurf-assisted codeIs Claude Code safe? Security assessment for Anthropic's CLI agentIs GitHub Copilot safe? Enterprise-grade security considerationsIs Supabase safe? Realistic security assessment in 2026Is Firebase safe? 2026 security reality checkIs Clerk safe? Security assessment for Clerk-authenticated appsIs Auth0 safe? 2026 security considerationsIs Vercel safe? Platform security assessmentIs Netlify safe? Platform security assessmentIs Cloudflare Workers safe? Edge-runtime security assessmentSecurity glossaryBroken Object-Level AuthorizationInsecure Direct Object ReferenceRow-Level SecurityServer-Side Request ForgeryCross-Site Request ForgeryCross-Site ScriptingSQL InjectionPrompt InjectionJSON Web TokenOAuthContent Security PolicyHTTP Strict Transport SecuritySupply-chain Levels for Software ArtifactsSoftware Bill of MaterialsAI Bill of MaterialsRegular Expression Denial of ServiceRemote Code ExecutionMulti-Factor AuthenticationProof Key for Code ExchangeSecretCommon Vulnerabilities and ExposuresStatic Application Security TestingDynamic Application Security TestingInteractive Application Security TestingSOC 2Zero TrustDefense in DepthPrinciple of Least PrivilegeWeb AuthenticationPasskeyCommon Vulnerability Scoring SystemOpen Worldwide Application Security ProjectNational Institute of Standards and TechnologyThreat ModelingPenetration TestingBug Bounty ProgramWeb Application FirewallRole-Based Access ControlDevSecOpsShift-Left SecurityTrusted Execution EnvironmentTemplatessecurity.txt template (RFC 9116)Privacy Policy template — startup-friendlyData Processing Agreement templateSupabase RLS policy starter packNext.js security headers configIncident response playbook templateSecure Next.js middleware.ts templateChecklistsPre-launch security checklist — before your app meets real usersSOC 2 checklist for startups — the 6-week pass planSupabase launch checklist — ship without leaking dataNext.js security checklist — 2026 production readyAI feature security checklist — LLMs, RAG, agentsOpen-source release security checklistSecurity questionnaire checklist — answer 'yes' to every enterprise askVibe coding security checklist — before your app goes viral
Blog, Legal, And Security
Editorial, policy, and disclosure resources.
BlogThe seven Supabase mistakes we see in every AI-built appHow to pass your first SOC 2 as a vibe coder (six weeks, $5K, solo)92% of AI-generated authentication code has at least one bug — here is the catalogAnatomy of the Moltbook hack — 1.5 million API keys in 72 hoursCVE-2025-29927 one year later: 40% of Next.js apps still vulnerable45% of AI-suggested code is insecure — the exact prompts that make it saferIntroducing Securie — the autonomous security engineer for AI-built softwareWhy AI-generated code is unsafe by defaultHow Securie runs: the launch inference stackPrivacy PolicyTerms of ServiceData Processing AgreementSecurity badges