Loading...
Loading...
Found 4 Skills
Identify storage buckets that are publicly accessible and may contain sensitive data.
Attempt to list and read files from storage buckets to verify access controls.
Attempt to read data from exposed tables to verify actual data exposure and RLS effectiveness.
Scan the codebase for potential secret leaks including API keys, tokens, passwords, hardcoded project IDs, and sensitive identifiers. Use when the user says "check for secrets", "scan for leaks", "security check", or before committing sensitive changes.