supabase
Audited by Socket on Feb 25, 2026
1 alert found:
Obfuscated FileThe provided documentation itself is not malware and contains no obfuscated or remote-execution payloads. However, it documents high-risk operations: use of Supabase service role keys (SUPABASE_SERVICE_KEY) and direct execution of arbitrary SQL via a CLI wrapper. These practices enable credential exposure, privilege escalation (bypassing RLS), and easy data exfiltration—especially when combined with automated agents. The highest priority mitigation is to avoid using service role keys in agent/CI contexts and to enforce least-privilege credentials, input validation, confirmation for destructive actions, and careful handling (or avoidance) of sending sensitive content to external embedding services.