Securie site index

Every public Securie security resource in one place: tools, guides, CVEs, leak playbooks, comparisons, checklists, research, legal pages, and disclosure documents.

Core

Waitlist, research, and company pages.

Guides

Deep dives on the bug classes AI-built apps actually ship.

All guidesSupabase RLS misconfiguration — detect, exploit, and fixBroken Object-Level Authorization (BOLA) in Next.js appsInsecure Direct Object Reference (IDOR) — what it is and how to prevent itLeaked API keys in Next.js — the most common vibe-coded mistakePrompt injection in AI apps — how attackers hijack your agentsVibe coding security risks — the 2026 field guideRate limiting in Next.js — the correct way in 2026Webhook signature verification — Stripe, GitHub, Clerk, everyoneCORS misconfiguration — how `Access-Control-Allow-Origin: *` breaks your appSecure cookies in Next.js — HttpOnly, Secure, SameSite explainedSecure file uploads in Next.js — content type, size, storage, servingSSRF prevention in Node.js — validate the resolved IP, not the URL stringSQL injection prevention in Node.js — parametrize everythingCSRF protection in Next.js — when you need it, when you don'tXSS in React — dangerouslySetInnerHTML and the specific bugs we seeJWT verification — the five ways apps get it wrongSecrets management — where to actually store your API keysSecurity headers for Next.js — CSP, HSTS, and the full listOAuth + OIDC security — the PKCE and state checks you cannot skipPassword hashing — Argon2id is the answer, here is howAPI key rotation — how to rotate without downtimeSession security — revocation, idle timeout, rotationGDPR for indie SaaS — the minimum viable compliance playbookEU AI Act for AI-built apps — what to ship before August 2026CCPA / CPRA for SaaS — what you actually have to doHIPAA for startups — when you need it, when you don't, how to start

Questions

Exact-match answers for founder security searches.

CVEs And Leaks

Plain-English vulnerability notes and credential rotation playbooks.

CVE libraryCVE-2025-29927 — Next.js middleware authentication bypassCVE-2025-48757 — Lovable project-enumeration exposureCVE-2024-39338 — Axios SSRF via absolute URLCVE-2024-28849 — Follow-Redirects credential forwardingCVE-2024-52798 — path-to-regexp ReDoSCVE-2025-27210 — Node.js HTTP request-smugglingCVE-2024-46982 — Next.js cache poisoning via path confusionCVE-2024-34351 — Next.js Server Actions SSRFCVE-2024-47831 — Next.js image optimization DoSCVE-2024-51479 — Next.js authorization bypass via static path rewriteCVE-2024-4067 — micromatch ReDoSCVE-2024-4068 — braces ReDoS (build-time DoS)CVE-2024-45590 — body-parser DoS via deeply nested URL-encoded inputCVE-2024-43796 — Express open redirectCVE-2024-43799 — send directory traversalCVE-2024-43800 — serve-static path confusionCVE-2024-37890 — ws WebSocket DoSCVE-2024-28176 — jose (JWT library) compressed-payload DoSCVE-2024-29415 — ip SSRF allowlist bypassCVE-2023-26136 — tough-cookie prototype pollutionCVE-2024-21538 — cross-spawn ReDoSCVE-2024-47068 — Rollup dev-mode XSSCVE-2023-49090 — Vite arbitrary file readCVE-2024-47875 — DOMPurify bypass on sandboxed iframesCVE-2024-28863 — node-tar DoS via malformed headerCVE-2024-22195 — Jinja2 XSS via xmlattr filterCVE-2023-44270 — PostCSS newline parsing bypassCVE-2024-35255 — Azure Identity library credential leakageCVE-2024-27982 — Node.js HTTP request-smuggling via space in Content-LengthCVE-2024-27983 — Node.js HTTP/2 DoS via unauthenticated reset-stream floodCVE-2024-30171 — Bouncy Castle timing side-channelCVE-2024-24549 — Apache Tomcat HTTP/2 DoSCVE-2024-21490 — Angular.js ReDoS in inline formatterCVE-2024-45296 — path-to-regexp outage-backtracking variantCVE-2024-32421 — Next.js race condition in cached fetchCVE-2024-39884 — Apache HTTP Server cache-key confusionCVE-2025-24840 — supabase-js session-refresh race conditionCVE-2024-21656 — Turborepo path traversal in cached outputsCVE-2024-42005 — Django QuerySet SQL injection via JSON key lookupsCVE-2024-45231 — Django reset-password user enumerationCVE-2024-38475 — Apache httpd mod_rewrite file-system escapeCVE-2024-32002 — Git RCE via case-insensitive filesystem symlinkCVE-2024-37891 — urllib3 proxy-auth credential leak through redirectsCVE-2024-6345 — Python setuptools RCE via package_indexCVE-2024-39689 — certifi removed GLOBALTRUST CA without updating pinned certsCVE-2024-29025 — Netty HttpPostRequestDecoder DoSCVE-2024-47178 — Nuxt devtools prototype pollutionCVE-2024-41818 — fast-xml-parser ReDoSCVE-2024-50379 — Apache Tomcat JSP TOCTOU RCECVE-2024-56204 — Composer cache-poisoning RCECVE-2024-47076 — CUPS IPP request input validationCVE-2025-0411 — 7-Zip Mark-of-the-Web bypassCVE-2024-39338 — Axios protocol-confusion SSRFCVE-2024-27980 — Node.js Windows command injection via child_processCVE-2024-30260 — undici header scrubbing bypassCVE-2024-22257 — Spring Security authorization bypassCVE-2024-27281 — Ruby RDoc command injection via documentation buildCVE-2024-7254 — Protocol Buffers StackOverflow DoSLeak playbooksLeaked OpenAI API key — what attackers do and how to rotateLeaked Supabase service-role key — worst-case exposureLeaked Stripe secret key — what you owe the attackerLeaked AWS access-key — billing, S3, and lateral movementLeaked Anthropic API key — Claude access and the billLeaked GitHub PAT — repo exfiltration and supply-chain riskLeaked Stripe restricted key — scoped damage, still rotateLeaked Twilio credentials — SMS fraud at scaleLeaked SendGrid API key — phishing via your domainLeaked Mailgun API key — same phishing risk as SendGridLeaked Resend API key — modern sender, same riskLeaked Google Cloud service-account key — treat as full GCP compromiseLeaked Azure Storage connection string — full blob accessLeaked Firebase Admin SDK — bypasses every security rule you wroteLeaked Clerk secret key — impersonate any userLeaked Auth0 Management API token — full tenant compromiseLeaked Slack bot token — data exfiltration + social engineeringLeaked Discord bot token — server compromiseLeaked Notion integration secret — workspace data exfiltrationLeaked Linear API key — ticket exfiltrationLeaked Datadog keys — observability pipeline compromiseLeaked Sentry DSN vs auth token — different risksLeaked PostHog keys — analytics pipeline compromiseLeaked Vercel access token — deploy access + secret leakLeaked Netlify personal access token — deploy + environment compromiseLeaked npm access token — supply-chain attack riskLeaked Cloudflare API token — DNS + CDN compromise

Comparisons And Alternatives

Head-to-head pages for existing security tools.

Stacks And Integrations

Framework, platform, and integration-specific security pages.

Audiences And Scenarios

Pages for founder profiles, incidents, and security panic moments.

All audiencesSecurie for vibe coders — ship AI-built apps safelySecurie for non-technical founders — security without codeSecurie for solo founders — a security team that's 1/20 your sizeSecurie for first-time founders — your security co-founderSecurie for AI app builders — LLM, agent, and RAG securitySecurie for designers who code — security without engineeringSecurie for bootstrapped founders — security without venture capitalAll scenariosMy API key leaked on GitHub — what do I do?My Supabase database might be public — how do I check?My first enterprise deal needs SOC 2 — I've never done oneSomeone tweeted that my app is leaking data — what do I do?My app just hit Hacker News / Product Hunt — am I about to get breached?My OpenAI bill hit $12,000 overnight — how?I don't know if my app is safe — where do I start?All my code was written by AI — how do I trust it?Incident postmortemsMoltbook — 1.5M API keys exposed via Supabase misconfigurationSaaStr production database wiped by Replit AgentLovable — VibeScamming prompt-injection backdoorAmazon.com — 6-hour outage from AI-assisted deployXZ Utils backdoor — three years of social-engineering supply chain attackLog4Shell — the single most impactful CVE of the decadeevent-stream npm — maintainer takeover supply-chain attackColonial Pipeline — leaked VPN password halts East Coast fuel supplyArup — $25M stolen via deepfake CFO video callOkta — stolen service account token → support-system compromiseMOVEit — single SQL injection → hundreds of downstream breachesCVE-2025-29927 — Next.js middleware bypass mass exploitation

Regions And Industry

Market-specific security playbooks.

Safety, Glossary, Templates, And Checklists

Reference material for builders and security reviewers.

Safety assessmentsIs Lovable safe? Honest security assessment for Lovable-built appsIs Bolt.new safe? Security assessment for Bolt-built appsIs v0 safe? Security assessment for v0-generated appsIs Replit safe? Security assessment for Replit Agent appsIs Cursor safe? Security considerations for Cursor-assisted codeIs Windsurf safe? Security considerations for Windsurf-assisted codeIs Claude Code safe? Security assessment for Anthropic's CLI agentIs GitHub Copilot safe? Enterprise-grade security considerationsIs Supabase safe? Realistic security assessment in 2026Is Firebase safe? 2026 security reality checkIs Clerk safe? Security assessment for Clerk-authenticated appsIs Auth0 safe? 2026 security considerationsIs Vercel safe? Platform security assessmentIs Netlify safe? Platform security assessmentIs Cloudflare Workers safe? Edge-runtime security assessmentSecurity glossaryBroken Object-Level AuthorizationInsecure Direct Object ReferenceRow-Level SecurityServer-Side Request ForgeryCross-Site Request ForgeryCross-Site ScriptingSQL InjectionPrompt InjectionJSON Web TokenOAuthContent Security PolicyHTTP Strict Transport SecuritySupply-chain Levels for Software ArtifactsSoftware Bill of MaterialsAI Bill of MaterialsRegular Expression Denial of ServiceRemote Code ExecutionMulti-Factor AuthenticationProof Key for Code ExchangeSecretCommon Vulnerabilities and ExposuresStatic Application Security TestingDynamic Application Security TestingInteractive Application Security TestingSOC 2Zero TrustDefense in DepthPrinciple of Least PrivilegeWeb AuthenticationPasskeyCommon Vulnerability Scoring SystemOpen Worldwide Application Security ProjectNational Institute of Standards and TechnologyThreat ModelingPenetration TestingBug Bounty ProgramWeb Application FirewallRole-Based Access ControlDevSecOpsShift-Left SecurityTrusted Execution EnvironmentTemplatessecurity.txt template (RFC 9116)Privacy Policy template — startup-friendlyData Processing Agreement templateSupabase RLS policy starter packNext.js security headers configIncident response playbook templateSecure Next.js middleware.ts templateChecklistsPre-launch security checklist — before your app meets real usersSOC 2 checklist for startups — the 6-week pass planSupabase launch checklist — ship without leaking dataNext.js security checklist — 2026 production readyAI feature security checklist — LLMs, RAG, agentsOpen-source release security checklistSecurity questionnaire checklist — answer 'yes' to every enterprise askVibe coding security checklist — before your app goes viral

Blog, Legal, And Security

Editorial, policy, and disclosure resources.