Built with AI? Check if it's secure.
Ship fast, ship safe.
Cursor, Bolt, Lovable, v0, Replit. AI tools build fast but skip security. Enter your URL and we'll check for the mistakes AI-generated apps make most.
Free scan. Results in seconds. Framework-aware fix instructions.
What we check
Every check targets a real pattern we see in AI-generated apps, not theoretical risks.
Exposed Files
Checks if sensitive files like .env, .git, or source maps are publicly accessible.
- .env file accessible
- .git directory exposed
- Source maps in production
- Directory listing enabled
Leaked Secrets
Scans page source and JavaScript bundles for API keys, tokens, and credentials.
- Firebase API keys
- AWS access keys
- Stripe secret keys
- OpenAI tokens
- Generic secrets in code
Misconfiguration
Detects common configuration mistakes that AI coding tools leave behind.
- Permissive CORS policy
- Debug mode enabled
- Open admin panels
- Verbose error responses
Vulnerable Dependencies
Identifies outdated JavaScript libraries with known security vulnerabilities.
- jQuery XSS vulnerabilities
- Lodash command injection
- Outdated framework versions
- Known CVEs in dependencies
Missing Protections
Verifies security headers, CSP, and cookie flags that AI tools rarely add.
- Content Security Policy
- HSTS header
- X-Frame-Options
- Secure cookie flags
Open API Endpoints
Tests if common API routes respond with data without requiring authentication.
- /api/users accessible
- /api/data exposed
- GraphQL introspection enabled
- Config endpoints open
Code Quality
Detects risky JavaScript patterns that create XSS vectors and data exposure.
- Inline event handlers (onclick, onerror)
- eval() and new Function()
- Sensitive data in localStorage
- document.write() usage
Network Security
Checks for rate limiting, open redirects, and information leakage in robots.txt.
- Missing rate limiting headers
- Open redirect via URL params
- Sensitive paths in robots.txt
What AI coding tools get wrong
These patterns show up in almost every AI-generated app we scan.
No Content Security Policy
Leaves the app wide open to XSS attacks
Source maps in production
Full source code readable by anyone
API keys in JavaScript bundles
Firebase, Stripe, and AWS keys exposed to the browser
Debug mode left on
Stack traces and internal paths visible on errors
No HSTS header
Browser can be tricked into using HTTP instead of HTTPS
CORS set to wildcard
Any website can make requests to your API
.env file accessible
Database passwords and secrets downloadable from the URL
Admin panel without auth
/admin or /dashboard accessible without login
Frequently asked questions
Ready to check your app?
Takes less than 30 seconds. No signup required.