AGENT LAB: SKILLS
skills/yoanbernabeu/supabase-pentest-skills

yoanbernabeu/supabase-pentest-skills

25 skills1.5K total installsGithubGithubGitHub

supabase-audit-rls

Test Row Level Security (RLS) policies for common bypass vulnerabilities and misconfigurations.

92

supabase-pentest

Orchestrate a complete Supabase security audit with guided step-by-step execution and ownership confirmation.

82

supabase-help

Quick reference for all Supabase security audit skills with usage examples and command overview.

69

supabase-audit-auth-config

Analyze Supabase authentication configuration for security weaknesses and misconfigurations.

68

supabase-audit-realtime

Test Supabase Realtime WebSocket channels for unauthorized subscriptions and data exposure.

67

supabase-report

Generate a comprehensive Markdown security audit report with executive summary, findings, and remediation guidance.

65

supabase-extract-db-string

CRITICAL - Detect exposed PostgreSQL database connection strings in client-side code. Direct DB access is a P0 issue.

63

supabase-audit-tables-list

List all tables exposed via the Supabase PostgREST API to identify the attack surface.

63

supabase-audit-functions

Discover and test Supabase Edge Functions for security vulnerabilities and misconfigurations.

63

supabase-extract-service-key

CRITICAL - Detect if the Supabase service_role key is leaked in client-side code. This is a P0 severity issue.

62

supabase-audit-rpc

List and test exposed PostgreSQL RPC functions for security issues and potential RLS bypass.

62

supabase-extract-anon-key

Extract the Supabase anon/public API key from client-side code. This key is expected in client apps but important for RLS testing.

62

supabase-extract-url

Extract the Supabase project URL from client-side JavaScript code, environment variables, and configuration files.

62

supabase-detect

Detect if a web application uses Supabase by analyzing client-side code, network patterns, and API endpoints.

61

supabase-audit-buckets-list

List all storage buckets and their configuration to identify the storage attack surface.

61

supabase-audit-buckets-public

Identify storage buckets that are publicly accessible and may contain sensitive data.

61

supabase-audit-tables-read

Attempt to read data from exposed tables to verify actual data exposure and RLS effectiveness.

61

supabase-audit-auth-signup

Test if user signup is open and identify potential abuse vectors in the registration process.

61

supabase-extract-jwt

Extract and decode Supabase-related JWTs from client-side code, cookies, and local storage patterns.

61

supabase-audit-auth-users

Test for user enumeration vulnerabilities through various authentication endpoints.

60

supabase-report-compare

Compare two security audit reports to track remediation progress and identify new vulnerabilities.

60

supabase-audit-authenticated

Create a test user (with explicit permission) to audit what authenticated users can access vs anonymous users. Detects IDOR, cross-user access, and privilege escalation.

60

supabase-audit-buckets-read

Attempt to list and read files from storage buckets to verify access controls.

60

supabase-evidence

Initialize and manage the evidence collection directory for professional security audits with documented proof of findings.

37

supabase

Main entry point for Supabase security audits. Launch a complete audit or quickly access any toolkit feature.

1