Live audit · 24h delivery · Active probe confirms every leak

Find what your Firebase project is leaking right now — from $29.

There are 1,748+ public GitHub repos with leaked Firebase configs right now. Half of those Firestore instances respond to anonymous reads on /users, /orders, /messages. Is yours one of them? Find out in 10 seconds.

⭐ 5 ecosystems supported 🔓 MIT open source — runs locally 🛡️ Active anon probe (not just rule parsing) ⚡ 7 detection patterns
Try the free instant scanner first
⚡ Free in-browser scan →
Paste your project ID. See which collections are publicly readable. No sign-up. No data sent to my server.

What you get with a paid audit

Pick a tier
Impulse
$5
Top-5 fix bundle, plain text, 12h email
Get $5 fixes
Recurring
Monitoring
$9/mo
Weekly auto-scan + email digest of new leaks
Subscribe $9/mo
Lite
$29
Top 3 critical fixes + written summary, 24h
Get $29 lite
Full
$99
Every match block + 30d Q&A, 24h
Get $99 full
Source code on GitHub (MIT, runs locally)
Want to test the auditor first? Run it free on Apify (no install):
▶ firebase-security-auditor on Apify
Why now?

Firebase test-mode rules expire after 30 days, but most devs forget the deadline and hard-code request.time < timestamp.date(2099, 1, 1) "temporarily." That's still wide-open in 2026 unless someone audits. Test-mode auto-expiry shipped in Firebase mid-2018; if your project is older than that, run the scan now.

Why me?

I publish the auditor itself open-source (MIT). I built and run all 5 BaaS security scanners (Supabase, PocketBase, Appwrite, Hasura/Nhost, Firebase). I'm not just selling consulting — I'm packaging real, repeatable detection.

Built by Perufitlife · All tools MIT licensed · Questions? renzomacar@gmail.com