Vulnerability Hub
AI vulnerability modules with clear exploit & fix guidance
Explore high-priority vulnerability modules with detection signals, attack paths, and remediation checklists for AI-generated apps.
5Modules
3Critical
2High
API Key Exposure
CriticalLeaked API credentials in client bundles, logs, source maps, and misconfigured environment variables.
LovableBolt.newv0+2
View guideMissing Supabase RLS
CriticalTables without restrictive Row Level Security policies allow unauthorized reads and writes.
LovableBolt.newReplit+1
View guidePrompt Injection
HighUntrusted input manipulates model behavior, triggering unauthorized actions or data disclosure.
ClaudeCursorLovable+1
View guideIDOR and Auth Bypass
CriticalEndpoints trust client IDs without server-side ownership checks, enabling account data access.
CursorBolt.newReplit+1
View guideHallucinated Dependencies
HighLLM-invented package names are hijacked by attackers for supply-chain compromise.
All AI coding platforms
View guide