VIBE CODE SCANNER
Multi-platform scanner for AI-generated web apps — whatever tool you built with. Detects exposed keys, missing auth, and open databases in under two minutes.
SCAN YOUR VIBE-CODED APP NOW
Lovable, Bolt, v0, Cursor, Claude Code, Replit, Windsurf — enter your deployed URL and we probe for the failure modes specific to AI-generated apps.
What is a vibe code scanner?
A vibe code scanner is an automated security tool that probes a live AI-generated web app for the specific failure modes that AI coding tools tend to ship: exposed API keys in the browser bundle, missing Row Level Security on Supabase and Firebase tables, admin routes without auth checks, and open storage buckets. It runs against your deployed URL, no source code required, and returns findings in under two minutes.
This scanner covers apps built with Lovable, Bolt.new, Cursor, Claude Code, v0, Replit, Base44, Figma Make, and Windsurf — the full family of AI-generated-app tools — and everything they typically deploy onto (Vercel, Netlify, Railway, Render, Fly.io).
The vibe-coded app security checklist
AI coding tools have a family of recurring gaps. This scanner tests all of them in one pass:
- Missing Row Level Security on Supabase or Firebase tables
- Exposed API keys in the frontend bundle (Stripe secret, Firebase service account, OpenAI, Anthropic, AWS)
- Auth flows that check the user but skip role or permission checks
- CORS set to
*on endpoints that return sensitive data - Debug routes and admin panels that shipped to production
- Public storage buckets with no ACL
- Inline scripts that force an unsafe Content Security Policy
- Webhooks with no signature verification
eval()or remote-code execution of user input
What the scanner detects
EXPOSED CREDENTIALS
API keys, OAuth secrets, JWT secrets, webhook secrets loaded into the frontend.
MISSING AUTH
Admin or privileged routes reachable without a session or role check.
OPEN DATABASES
Supabase tables, Firestore collections, and Mongo endpoints readable or writable anonymously.
BROKEN CORS
Cross-origin policies that allow any origin to read authenticated responses.
OPEN STORAGE
Public buckets on S3, Supabase Storage, or Firebase Storage with no access rules.
BOLA / IDOR
Change an ID in a request and read another user's data — the classic vibe-coded bug.
How to use
- Paste the URL of your deployed app into the scanner at the top of this page.
- Wait ~2 minutes — the scanner loads the app, captures every request, and probes common attack surfaces.
- Review findings by severity: Critical, High, Medium, Low. Each includes evidence (which URL, header, or bundle triggered the detection).
- Copy the fix prompt into Claude Code, Cursor, or Lovable to patch the issue.
- Rescan to confirm the fix before you ship.
Which AI coding tools have the most common issues?
| Tool | Primary stack | Most common finding |
|---|---|---|
| Lovable | React + Supabase | Missing Row Level Security |
| Bolt | Vite + any backend | Hardcoded API keys in bundle |
| v0 | Next.js + any backend | Server actions with no auth |
| Cursor | Any | Generated code lacks input validation |
| Claude Code | Any | Missing rate limiting and authorization |
| Replit | Full-stack | Public databases and exposed .env |
| Windsurf | Any | Hardcoded secrets in frontend |
Related tools and guides
- Token Leak Checker — focused scan for exposed API keys in the frontend bundle.
- Firebase Scanner — Firestore Security Rules, auth, and storage bucket checks.
- Supabase RLS Checker — verify every table has a correct Row Level Security policy.
- Lovable Safety Guide — what Lovable ships insecure by default and how to fix it.
- Is Replit Safe? — public repls, Secrets in forks, and AI-generated endpoints without auth.
- Is Netlify Safe? — build-log leaks, redirect rules, and Functions audit.
- Cursor Security Risks — full Cursor risk profile and hardening checklist.
- Firebase Security Rules: 12 Common Mistakes — rule snippets that fix each mistake.
- Best Burp Suite Alternatives — 9 alternatives compared on features, price, and learning curve.
- Best SAST Tools for AI-Generated Code — Snyk vs Semgrep vs Checkmarx vs VibeEval.
- OWASP Top 10 for AI Code — the canonical failure modes for AI-generated apps.
- Vibe Hacking — how attackers probe vibe-coded apps, so you can think like one.
COMMON QUESTIONS
DEEP SCAN WITH THE FULL AGENT
Go beyond the surface scan. The agent tests RLS, auth bypasses, and every API route.