paid security review · 48h · $199

the 8 ways AI codegen ships broken security — i find them before launch.

cursor, claude code, v0, bolt, lovable, replit all ship code fast. they also ship the same handful of security holes over and over: secrets in client bundles, USING (true) RLS, public storage buckets, exposed service-role keys, missing tenant scoping. i read your repo, probe your staging, send a pdf in 48h. $199 fixed.

buy now — $199 what you get money back if i find nothing critical or high.

what you get

no calls. no slack channel. one pdf, ranked by exploitability, with code fixes you can paste in.

  • +read-only access to your repo (private github is fine, just invite me)
  • +static code review, 1–3 hours of my time depending on size
  • +light runtime probe of your staging url if you share one (no destructive testing)
  • +pdf report ranked critical / high / medium / low
  • +every finding has a file + line range, what the AI missed, and the fix (often 5 lines of code)
  • +delivered 48h from kickoff. no scope creep, no upsell.
  • +full refund if nothing comes back critical or high.

the 8 patterns i look for

these are the bugs i keep finding in AI-generated mvps. same shape across supabase, firebase, nhost, pocketbase, appwrite, raw node.

service_role key in client

the AI grabbed the admin key from .env because the page wouldn't compile. now it's in your js bundle and anyone can drop your tables.

USING (true) RLS policies

the model "fixed" RLS errors by writing a policy that lets every user read every row. classic. i grep for it first.

public storage buckets

uploads bucket left public so the demo works. now every customer's invoices are listable by url guessing.

secret in client bundle

NEXT_PUBLIC_* prefixed by accident, stripe restricted key shipped to browser, openai key in vite env. easy to spot, easy to abuse.

missing tenant scoping

every query reads from orders with no where tenant_id = auth.uid(). multi-tenant SaaS where tenant A sees tenant B's data.

unauthenticated edge functions

cron endpoint, webhook receiver, ai proxy, all reachable without a header check. anyone hits it, you pay the bill.

unbounded loops & n+1 reads

not a "security" bug until someone scripts it. AI loves while (cursor) with no max iterations. one bad input = 6-figure cloud bill.

broken auth checks

if (user) {} instead of if (user?.id === resource.owner_id). logged-in user A can delete logged-in user B's stuff.

why me

not a security agency. a builder who shipped real auditors and got burned by my own AI code first.

5 open-source BaaS security auditors on npm (supabase, firebase, pocketbase, appwrite, nhost).

~1500 weekly downloads on the supabase one.

14 critical leaks i found in my own production CRM after it was generated mostly by AI. write-up:

dev.to/perufitlife — i built a supabase security tool, then found 14 critical leaks in my own production crm

how it works

three steps. no meetings.

step 01

pay + invite

pay the stripe link. you get an email asking for a github invite (read-only) and an optional staging url. that's kickoff.

step 02

i review

i grep, read, run my own tooling against your stack, and probe your staging url if you sent one. no calls, no async ping-pong.

step 03

pdf in 48h

you get a pdf with findings ranked by exploitability. each one has file + line, what's wrong, and the fix. ship the patches yourself.

faq

the stuff people ask before paying.

what if my repo is huge?

$199 covers up to ~50k lines of app code (excluding node_modules / generated). over that, i'll quote you before starting or refund. i'm not going to pretend i read a million-line monorepo in 3 hours.

do you sign an NDA?

yes, send yours and i'll sign. plain mutual NDA, no weird clauses. if you don't have one i have a one-page template.

what stacks do you cover?

strongest on: next.js / react / svelte / astro front-ends, supabase / firebase / nhost / pocketbase / appwrite back-ends, node + python edge functions, stripe + webhooks. weakest on: native mobile, rust, embedded. ask me if you're unsure.

what's not included?

no pen-testing of production, no destructive payloads, no compliance paperwork (SOC2 / HIPAA / PCI). this is a code-and-config review with light runtime probing. if you need formal pen-test, hire a firm.

how does the money-back guarantee work?

if my pdf has zero critical or high findings, i refund 100% via stripe. i still send the report. you keep it. this filters out repos that don't need me anyway.

ready to know what your AI shipped?

48h. one pdf. $199. money back if it's clean.

buy now — $199