• Agents
  • Pricing
  • Blog
Log in
Get started

Security for apps built with AI. Paste a URL, get a report, fix what matters.

Product

  • How it works
  • What we find
  • Pricing
  • Agents
  • MCP Server
  • CLI
  • GitHub Action

Resources

  • Guides
  • Blog
  • Docs
  • OWASP Top 10
  • Glossary
  • FAQ

Security

  • Supabase Security
  • Next.js Security
  • Lovable Security
  • Cursor Security
  • Bolt Security

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Imprint
© 2026 Flowpatrol. All rights reserved.

Insights & Updates

Security research, breach analysis, and engineering deep-dives.

RSS
Three Apps. Three Firebase Breaches. One Rule That Caused All of Them.
SecurityMay 11, 20268 min read

Three Apps. Three Firebase Breaches. One Rule That Caused All of Them.

Cal AI lost 3.2M health records. Tea leaked 72,000 government IDs. 900+ sites exposed 125M records. The root cause was identical every time: allow read, write: if true. Here's how to fix it in minutes.

Read article
SSRF in 60 seconds: the link preview that steals your AWS keys
SecurityMay 4, 2026

SSRF in 60 seconds: the link preview that steals your AWS keys

Server-Side Request Forgery (SSRF) is the one-line bug every 'paste a URL' feature ships by default. Save a 30-line Node server, curl two URLs, and watch your own server hand over AWS credentials — the same bug that cost Capital One 100 million customer records in 2019.

Read more
Your code passed the linter. Your app failed a 2-minute curl test.
SecurityMay 4, 2026

Your code passed the linter. Your app failed a 2-minute curl test.

SAST scanners match patterns. Secure templates start clean. Neither one can send a forged request to your running app and tell you what comes back.

Read more
The app making $100K a month had no auth middleware. It took 2 minutes to find out.
Case StudyApr 30, 2026

The app making $100K a month had no auth middleware. It took 2 minutes to find out.

A Brazilian SaaS founder built a $100K/month product without writing code. Then a user named Tiago made a few API requests — no login required. Here's what was missing and how to check your own app.

Read more
Lovable Builds Your App. For 48 Days, Anyone on Lovable Could Read It.
Case StudyApr 30, 2026

Lovable Builds Your App. For 48 Days, Anyone on Lovable Could Read It.

A free Lovable account was all it took to read any other user's source code, database credentials, and AI chat history. 48 days. Every project before November 2025.

Read more
The AI Took 9 Seconds. The Recovery Took 30 Hours.
Case StudyApr 30, 2026

The AI Took 9 Seconds. The Recovery Took 30 Hours.

A Cursor agent running Claude Opus 4.6 found a Railway token in an unrelated config file, assumed it was staging-scoped, and deleted everything — production data and backups together.

Read more
Your AI wrote a deep-merge endpoint. Here's what happens when you POST __proto__ to it.
SecurityApr 28, 2026

Your AI wrote a deep-merge endpoint. Here's what happens when you POST __proto__ to it.

Save a 25-line Express file, run one curl, watch isAdmin flip to true for every object in the process. Prototype pollution in under 2 minutes — plus the one-line fix.

Read more
Same default, four breaches: what Moltbook, Tea, Cal AI, and Quittr all shipped to production
ExplainerApr 16, 2026

Same default, four breaches: what Moltbook, Tea, Cal AI, and Quittr all shipped to production

Four of the biggest vibe-coded consumer apps of the last year shipped with the same root cause: the BaaS default that said yes to everyone. One was Supabase. Three were Firebase. All four made the news. Here's the pattern, the shared anatomy, and the one check that catches all of them.

Read more
Your Stripe webhook is probably missing one line. Here's the 60-second test.
Case StudyApr 13, 2026

Your Stripe webhook is probably missing one line. Here's the 60-second test.

Save a 30-line Node file, run it, curl it. In 60 seconds you'll know whether your Stripe webhook is the kind that any stranger on the internet can forge events against — and you'll have the six-line fix.

Read more
600,000 confessions from a quit-porn app. Firebase stored them all behind `allow read, write: if true`.
Case StudyApr 12, 2026

600,000 confessions from a quit-porn app. Firebase stored them all behind `allow read, write: if true`.

Quittr collected age, self-reported frequency, emotional triggers, and free-text confessions from 600,000 users — roughly 100,000 of them minors. Every record was publicly readable. The cause wasn't negligence. It was Firebase's default test-mode rules, unchanged since day one.

Read more
Your Agent Builds Apps. Who Checks the Security?
ProductApr 10, 2026

Your Agent Builds Apps. Who Checks the Security?

AI agents are writing code, deploying apps, and managing infrastructure. But most agent workflows skip security entirely. Here's why that's about to change.

Read more
The axios hack: a quick check to see if you got compromised, and a step-by-step cleanup if you did.
SecurityApr 9, 2026

The axios hack: a quick check to see if you got compromised, and a step-by-step cleanup if you did.

Five quick checks you can paste. Each prints COMPROMISED or CLEAN so you don't have to interpret anything. If any of them fail, a step-by-step cleanup guide with the exact commands to rotate your accounts, lock out the attacker, and rebuild your laptop clean.

Read more
The OTP Wall of Broken Locks: Real-World Verification Bypasses That Keep Happening
Case StudyApr 9, 2026

The OTP Wall of Broken Locks: Real-World Verification Bypasses That Keep Happening

OTP verification feels like a lock on your front door. But across Zomato, Grab, MTN, Shopify, and dozens of others, researchers keep walking right through it. Here are the patterns and how to avoid them.

Read more
Shai-Hulud: The First Self-Replicating npm Worm
Case StudyApr 8, 2026

Shai-Hulud: The First Self-Replicating npm Worm

September 2025: Attackers compromised 18 npm packages including debug (500M downloads/week) and chalk. Infected developers became spreaders. Every victim who maintained packages automatically published infected versions of their own work. The first confirmed self-propagating npm worm.

Read more
One Line of Code Stole Your Emails: The First MCP Supply Chain Attack
Case StudyApr 7, 2026

One Line of Code Stole Your Emails: The First MCP Supply Chain Attack

A fake Postmark npm package BCC'd every email your AI agent sent to an attacker. One line of code. Eight days. Thousands of password resets stolen. Here's what happened and why your MCP tools need the same scrutiny as your app code.

Read more
The Replit Agent Deleted My Database. When I Told It to Stop, It Ignored Me.
Case StudyApr 7, 2026

The Replit Agent Deleted My Database. When I Told It to Stop, It Ignored Me.

July 2025: Jason Lemkin gave Replit's agent one task. It deleted 1,200+ production records, covered it up with 4,000 fake users, and kept working. When told to stop in all caps, it didn't.

Read more
Azure Sign-In Log Bypass: Four Bugs That Made Logins Invisible
Case StudyApr 6, 2026

Azure Sign-In Log Bypass: Four Bugs That Made Logins Invisible

A 50,000-character string was enough to log in to Azure without leaving a single trace. Here is how four trivial bugs broke the audit trail half the internet relies on — and what it means for the platforms you ship on.

Read more
IDOR in 60 seconds: change a 1 to a 2 and see what comes back
Case StudyApr 6, 2026

IDOR in 60 seconds: change a 1 to a 2 and see what comes back

IDOR (Insecure Direct Object Reference) is the single most common bug in AI-generated REST APIs. Save a 30-line Express file, curl two URLs, and see the exact missing line that opens half the APIs vibecoders ship — and the one-line patch that closes it.

Read more
Claude Code has two memories. Yours probably should too.
BuildersApr 6, 2026

Claude Code has two memories. Yours probably should too.

Everyone read the Claude Code leak looking for frustration regexes and April Fools easter eggs. The interesting part was quieter: the three-part memory system that decides what your agent remembers between turns, sessions, and weeks.

Read more
Most AI-built Supabase apps leak their users table. Here's how to check yours in 2 minutes.
SecurityApr 6, 2026

Most AI-built Supabase apps leak their users table. Here's how to check yours in 2 minutes.

Two minutes, one SQL paste, one line of JavaScript. Create a free Supabase project, run the drill, and learn the single most common Supabase mistake in AI-generated code — on a throwaway instance you control.

Read more
How Supabase RLS Gave Users Two Ways to Go Premium
SecurityApr 6, 2026

How Supabase RLS Gave Users Two Ways to Go Premium

Most Supabase apps have two paths to change subscription status: the correct one (Stripe webhook) and an accidental one (client-side API). Guess which one builders usually lock down.

Read more
Admin Panels Wide Open: The Door AI Forgot to Lock
SecurityApr 5, 2026

Admin Panels Wide Open: The Door AI Forgot to Lock

Your AI built a beautiful admin dashboard. It also made it accessible to anyone who types /admin. Here's how to find exposed admin routes and lock them down in minutes.

Read more
Langflow RCE: Code Execution Before the Auth Check — Two Years Open, Then a Botnet
Case StudyApr 5, 2026

Langflow RCE: Code Execution Before the Auth Check — Two Years Open, Then a Botnet

A GitHub issue reported an RCE on Langflow's code validation endpoint in July 2023. It sat open 20 months. The endpoint used exec() BEFORE checking auth. One curl. One Python decorator. CVE-2025-3248.

Read more
npm Supply Chain Hygiene for Vibe Coders
GuidesApr 4, 2026

npm Supply Chain Hygiene for Vibe Coders

AI tools generate package.json with caret ranges that auto-install new versions. Here's how to lock down your dependency tree before a compromised package lands in your next deploy.

Read more
Your Sign-Up Flow Has a Backdoor
SecurityApr 4, 2026

Your Sign-Up Flow Has a Backdoor

Your AI built email verification with the OTP in the response, hardcoded bypass codes, no rate limiting, and no expiry. Real apps shipped with all seven patterns. Here's what to fix.

Read more
AI Agent Safety: What Your Agent Can Destroy (And How to Stop It)
GuidesApr 3, 2026

AI Agent Safety: What Your Agent Can Destroy (And How to Stop It)

AI agents can read your database, send emails, and call APIs. Here's how to give them exactly the access they need — and not one bit more.

Read more
CamoLeak: A PR Comment Made Copilot Steal Your Private Code
Case StudyApr 3, 2026

CamoLeak: A PR Comment Made Copilot Steal Your Private Code

A hidden prompt in a PR comment tells GitHub Copilot to steal your AWS keys. The exfiltration channel? GitHub's own Camo image proxy. CVSS 9.6. Zero-click. No malware. Just one character at a time.

Read more
Cursor IDE Vulnerabilities: When Your Code Editor Becomes the Attack Vector
Case StudyApr 3, 2026

Cursor IDE Vulnerabilities: When Your Code Editor Becomes the Attack Vector

Three CVEs turned Cursor — the AI editor developers trust most — into a tool attackers could use against you. A deep technical breakdown of CurXecute, MCPoison, and the case-sensitivity bypass, plus what every builder needs to do right now.

Read more
How to Secure Your MCP Setup
GuidesApr 3, 2026

How to Secure Your MCP Setup

MCP is worth using. Here's how to install packages safely, pin versions, read what you install, and keep your agent tools from becoming a supply chain liability.

Read more
The axios maintainer had 2FA enabled. North Korea took his npm account anyway.
Case StudyApr 2, 2026

The axios maintainer had 2FA enabled. North Korea took his npm account anyway.

On March 31, 2026, a North Korean state actor tricked axios's lead maintainer into installing a fake Microsoft Teams update during a staged video call. The maintainer had 2FA enabled. Two hours and 54 minutes later, npm had served a cross-platform RAT to every CI pipeline that rebuilt in the window. Here's exactly how they did it, and what to check right now.

Read more
Wix Paid $80 Million for Base44. Weeks Later, Two API Calls Broke Every Auth System.
Case StudyApr 2, 2026

Wix Paid $80 Million for Base44. Weeks Later, Two API Calls Broke Every Auth System.

June 2025: Wix acquires Base44 for $80M. July 2025: Two HTTP requests bypass every login, including SSO, on every private app. Zero exploit complexity. Zero prior detection.

Read more
3.2 Million Health Records Exposed: The Firebase Rule That Said Yes to Everyone
Case StudyApr 2, 2026

3.2 Million Health Records Exposed: The Firebase Rule That Said Yes to Everyone

March 9, 2026: Cal AI's Firebase backend had one rule for every collection: allow read, write: if true. No authentication. No rate limiting. A health data breach affecting kids, weight logs, and 4-digit PINs. Here's the exact misconfiguration and how to find yours.

Read more
Polyfill.io: 380,000 Sites, One CDN, One Domain Sale
Case StudyApr 2, 2026

Polyfill.io: 380,000 Sites, One CDN, One Domain Sale

June 25, 2024: JSTOR, Hulu, Intuit, Mercedes-Benz, Warner Bros, and the World Economic Forum all started serving malware. They didn't change their code. Someone else bought the domain.

Read more
Tea: 72,000 Government IDs, 1.1 Million Private Messages. A Firebase Bucket With No Lock.
Case StudyApr 2, 2026

Tea: 72,000 Government IDs, 1.1 Million Private Messages. A Firebase Bucket With No Lock.

July 2025: A dating safety app's Firebase Storage bucket sits wide open. No authentication required. Government IDs, verification selfies, GPS coordinates, 1.1M messages disclosing assault, abuse, stalking — all readable with a single GET request.

Read more
The Five Ways React's Escaping Fails — And How AI Makes You Ship Them
SecurityApr 2, 2026

The Five Ways React's Escaping Fails — And How AI Makes You Ship Them

React escapes by default. Except for markdown, URLs, server-rendered strings, eval(), and dangerouslySetInnerHTML — five patterns AI generates almost every time. Here's what to watch for and how to fix it.

Read more
XZ Utils Backdoor: The 3-Year Long Con
Case StudyApr 2, 2026

XZ Utils Backdoor: The 3-Year Long Con

Someone spent three years building trust in open source to plant a backdoor in a compression library used by every Linux server on the planet. Here's what that means for your app.

Read more
916 Firebase Projects Left Wide Open: 125 Million Records, 19 Million Plaintext Passwords, Zero Warnings
Case StudyApr 1, 2026

916 Firebase Projects Left Wide Open: 125 Million Records, 19 Million Plaintext Passwords, Zero Warnings

This wasn't one breach — it was a pattern. Researchers scanned 5 million domains and found over 900 Firebase projects with wide-open security rules. Here's what happened, why it keeps happening, and how to check your own project in 30 seconds.

Read more
CVE-2025-29927: The Next.js Middleware Bypass That Broke Auth With One Header
Case StudyApr 1, 2026

CVE-2025-29927: The Next.js Middleware Bypass That Broke Auth With One Header

A single HTTP header could skip every middleware check in Next.js — authentication, authorization, CSP, rate limiting, all of it. Here's exactly how CVE-2025-29927 works, who's affected, and what to do about it.

Read more
Ship Faster with Security in Your Terminal
ProductMar 31, 2026

Ship Faster with Security in Your Terminal

Introducing the Flowpatrol CLI — run security scans from your terminal with npm, pip, or brew. Scan any URL in minutes, get findings with fixes, pipe to jq or SARIF.

Read more
Security Checks on Every Pull Request
ProductMar 31, 2026

Security Checks on Every Pull Request

Introducing the Flowpatrol GitHub Action — scan every PR for vulnerabilities, post findings as comments, output SARIF for Code Scanning, and gate merges by severity.

Read more
IDOR: The Vulnerability AI Can't See
SecurityMar 29, 2026

IDOR: The Vulnerability AI Can't See

AI generates CRUD endpoints that work perfectly — but don't check if the requesting user actually owns the resource. Here's why it happens every time, how attackers exploit it, and the one-line fix.

Read more
The Moltbook Breach: 1.5 Million API Tokens Exposed Because RLS Was Off
Case StudyMar 29, 2026

The Moltbook Breach: 1.5 Million API Tokens Exposed Because RLS Was Off

In January 2026, Moltbook went viral — then Wiz researchers found the entire production database was open to anyone with a web browser. Here's exactly how it worked.

Read more
The OWASP Top 10 for Vibe Coders: What Your AI Actually Built
SecurityMar 29, 2026

The OWASP Top 10 for Vibe Coders: What Your AI Actually Built

Seven of the OWASP Top 10 hit your app by default. Here's what to look for, why it matters, and the one-line fixes that work.

Read more
SQL Injection Is Not Dead: How AI Keeps Reinventing It Under Modern ORMs
SecurityMar 29, 2026

SQL Injection Is Not Dead: How AI Keeps Reinventing It Under Modern ORMs

Parameterized queries. ORMs. Prisma. Drizzle. Supabase. All of it was supposed to kill SQL injection. Then AI started reaching for the escape hatch — and here we are.

Read more
Your .env Is Showing: Environment Variable Exposure in Vibe-Coded Apps
SecurityMar 29, 2026

Your .env Is Showing: Environment Variable Exposure in Vibe-Coded Apps

AI coding tools make shipping fast, but they also make leaking secrets easy. Here's how environment variables end up in your client-side bundle — and a 60-second self-test to find out if yours already have.

Read more
How to Secure Your Lovable App Before You Launch
GuidesMar 28, 2026

How to Secure Your Lovable App Before You Launch

A step-by-step security guide for apps built with Lovable. Fix the most common vulnerabilities in under an hour — no security expertise required.

Read more
The Lovable RLS Leak: 170+ Apps, 303 Open Endpoints, and a Database You Could Query From the Browser
Case StudyMar 28, 2026

The Lovable RLS Leak: 170+ Apps, 303 Open Endpoints, and a Database You Could Query From the Browser

CVE-2025-48757 was a systemic Row Level Security failure in Lovable — one of the biggest vibe coding platforms. 170+ apps exposed. Personal debt records, home addresses, and API keys, all readable with two strings from the page source.

Read more
What Happens When a Vibe-Coded App Gets Hacked: A Step-by-Step Breakdown
SecurityMar 28, 2026

What Happens When a Vibe-Coded App Gets Hacked: A Step-by-Step Breakdown

A realistic walkthrough of how an attacker finds, probes, and exploits a typical app built with AI coding tools. From Google dorking to data exfiltration, here's exactly what happens — and what you can do about each step.

Read more
Why We Use LLMs for Security Testing (And What They Actually Catch)
EngineeringMar 28, 2026

Why We Use LLMs for Security Testing (And What They Actually Catch)

Traditional scanners match patterns. LLM-powered scanners read your app like a human would. Here's a side-by-side comparison of what each one finds — and misses — on the same endpoint.

Read more
Introducing Flowpatrol: You Shipped It. Now Make Sure It's Solid.
ProductMar 27, 2026

Introducing Flowpatrol: You Shipped It. Now Make Sure It's Solid.

You built an app in a weekend. Flowpatrol is the five-minute scan that tells you if it's ready for the real world. Here's what it finds and how it works.

Read more
Your Supabase Anon Key Is Public. Without RLS, So Is Your Database.
SecurityMar 27, 2026

Your Supabase Anon Key Is Public. Without RLS, So Is Your Database.

If your Supabase app doesn't have Row Level Security on, anyone with your anon key can SELECT * from every table. Here's what AI tools generate, why it's broken, and the 15-minute fix.

Read more