supabase-extract-service-key
Supabase Service Key Detection
🔴 CRITICAL: PROGRESSIVE FILE UPDATES REQUIRED
You MUST write to context files AS YOU GO, not just at the end.
- Write to
.sb-pentest-context.jsonIMMEDIATELY after each discovery- Log to
.sb-pentest-audit.logBEFORE and AFTER each action- DO NOT wait until the skill completes to update files
- If the skill crashes or is interrupted, all prior findings must already be saved
This is not optional. Failure to write progressively is a critical error.
This skill detects if the service_role key (admin key) is accidentally exposed in client-side code.
When to Use This Skill
- As part of every security audit (this is critical)
- When reviewing code before production deployment
- After detecting Supabase usage to check for this common mistake
More from yoanbernabeu/supabase-pentest-skills
supabase-audit-rls
Test Row Level Security (RLS) policies for common bypass vulnerabilities and misconfigurations.
373supabase-pentest
Orchestrate a complete Supabase security audit with guided step-by-step execution and ownership confirmation.
239supabase-audit-auth-config
Analyze Supabase authentication configuration for security weaknesses and misconfigurations.
186supabase-audit-functions
Discover and test Supabase Edge Functions for security vulnerabilities and misconfigurations.
184supabase-help
Quick reference for all Supabase security audit skills with usage examples and command overview.
180supabase-audit-realtime
Test Supabase Realtime WebSocket channels for unauthorized subscriptions and data exposure.
173