LOVABLE DETECTOR
Paste a URL. We look at the bundle, the network requests, and the deployment host, and tell you whether it was built with Lovable.dev — plus the RLS, credential, and auth issues we commonly find in Lovable apps.
What a Lovable detector actually checks
A deployed Lovable app looks like a generic React SPA at a glance. Dig one layer deeper and the fingerprints are unmistakable. The detector checks four classes of signal:
01 / BUNDLE FINGERPRINTS
Vite chunk naming conventions, shadcn/ui class names in the DOM (data-radix-*, Tailwind utility combinations), and React Router v6 link patterns. Lovable's template locks these in.
02 / NETWORK TRAFFIC
Calls to <project>.supabase.co/rest/v1/ with apikey headers containing a JWT. Edge Function invocations at /functions/v1/. GraphQL at /graphql/v1.
03 / HOSTING SIGNATURES
Default *.lovable.app subdomain, or a custom domain with Lovable's CDN headers (x-served-by, cache-control defaults). Distinct from Vercel and Netlify.
04 / META + TELEMETRY
Default OG tags, favicon, and a trailing data-lov-id attribute in the DOM. Telemetry pings that match Lovable's analytics pipeline.
Confidence scoring: three or more signals in the same category lock in a positive. Two signals mean probable. One is a hint — usually not enough.
Why detect Lovable before you audit
Knowing the platform cuts audit time in half. A Lovable app has a predictable failure profile — the same five or six flaws show up in almost every one. Once detected, a pentester can skip the generic “what framework is this?” phase and jump straight to the probes that actually matter:
- Every Lovable app uses Supabase. Check RLS on every table.
- Every Lovable app ships the anon key in the frontend bundle. Check if it’s a read/write key to tables without policies.
- Every Lovable app can have Edge Functions. Check whether any are invoked with the service-role key from the browser.
- Every Lovable app has a Storage bucket. Check if it’s public.
- Every Lovable app has a login/signup flow. Check session token handling and password-reset abuse.
For detailed per-issue context, see Is Lovable Safe? and the full Lovable Security Scanner.
Running the detector
Paste the URL of a deployed Lovable-suspected app at the top of this page. The detector runs a read-only fingerprint check (no writes, no account data touched) and returns:
- Verdict: Lovable / not Lovable / ambiguous
- Confidence: percentage with which signals matched
- Stack surface: Supabase URL, Edge Functions discovered, Storage buckets seen
- Next step: a one-click link to the full security scan against the detected stack
The fingerprint check usually completes in under 15 seconds.
What “Lovable detected” means for your security posture
Detection is a starting point, not an assessment. Lovable the platform is safe. Lovable apps — as of April 2026, across 1,430+ scanned projects, and in the most recent 48-day chat-history exposure — ship with a consistent cluster of misconfigurations. The detector tells you what you’re looking at. The full scan tells you what’s actually broken.
If you’re auditing someone else’s Lovable app (with authorization), start here, then escalate. If you’re auditing your own, treat the detector output as a pre-flight check before running the full scan.
Related tools
- Vibe Code Scanner — multi-platform security scan for AI-generated apps
- Lovable Security Scanner — full RLS / auth / credential audit for Lovable
- Supabase RLS Checker — standalone Row Level Security probe
- Is Lovable Safe? — the full security analysis of the Lovable platform
- Lovable BOLA Vulnerability — the April 2026 disclosure in context
Sources and references
- Lovable Security Report Feb 2026 — 18,000 users exposed, 170+ databases breached
- Vibe Coding Security Weekly — Apr 23, 2026 — 48-day chat exposure, full timeline
- Supabase documentation on the anon key — why the browser gets a JWT and what RLS has to do
COMMON QUESTIONS
RUN THE FULL SECURITY SCAN
Once the stack is identified, run the full probe: RLS, auth, storage, exposed keys.