Documentation
Everything you need to secure your vibe-coded projects
Documentation
Security that fits how you already build.
BoringSec catches the security gaps that AI tools leave behind — hardcoded secrets, broken RLS, missing auth, unsafe patterns — and gives you copy-paste fixes for Cursor, Lovable, Bolt, and every other AI coding tool.
Why BoringSec?
Quick Start — Scan via API
One curl command. Results in seconds. No SDK needed.
curl -X POST https://boringsec.com/api/v1/scan \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{"url": "https://your-app.com"}'Get your API key at Settings → API Keys (Pro plan, $29/month)
Developer Guides
What BoringSec Scans
Every scan runs all applicable modules. You get one score, one report, and fix prompts for every issue.
Secret Detection
AI tools often hardcode API keys directly in your source. We detect 11 provider-specific patterns: Supabase, Stripe, OpenAI, Anthropic, AWS, GitHub, Firebase, and more.
Finds the Stripe key your Cursor session left in the bundle.
Scan for secretsSupabase & Firebase Security
We actually query your Supabase instance with the anon key to test if RLS is enforced. We also audit Firebase Security Rules and detect exposed service_role keys.
The only scanner that does live RLS testing, not just regex.
Test your RLSAuth & Middleware Gaps
Clerk publicRoutes wildcard, missing Next.js middleware, JWT tokens in localStorage, OAuth email linking vulnerabilities — 8 auth-specific patterns.
Catches the "everything is public by default" mistake.
Check your authInjection, XSS & SSRF
SQL injection, command injection, template injection, DOM-based XSS, reflected XSS, SSRF via user-controlled URLs, mass assignment with Prisma.
Finds the attack vectors AI-generated code commonly introduces.
Stripe & Payment Security
Stripe webhook handlers without constructEvent() verification, hardcoded Stripe keys, missing CSRF protection on payment flows.
Prevents anyone from forging "payment successful" events.
Fix Prompts (42+ Templates)
Every issue comes with a copy-paste fix prompt optimized for your specific AI tool — Cursor, Lovable, Bolt, Claude Code, v0, Windsurf, or Replit.
Fix a critical vulnerability in 2 minutes, not 2 hours.
Browse templates.cursorrules / AGENTS.md Generator
Generate stack-specific security rules that make every future AI coding session security-aware. Supports Next.js + Supabase, Firebase, Clerk, Stripe stacks.
Prevention > detection. Stop vulnerabilities before AI writes them.
Generate rules75+ Checks at a Glance
Security Headers
7 checks
SSL/TLS
5 checks
DNS (SPF/DKIM/DMARC)
4 checks
Exposed Files
4 checks
Cookies
3 checks
CORS
2 checks
XSS
2 checks
SQL Injection
3 checks
Supabase RLS
3 checks
Firebase Rules
2 checks
Hardcoded Secrets
11 patterns
Unsafe Code
15 patterns
Vulnerable Deps
20+ packages
GDPR
3 checks
Bundle Secrets
2 checks
WAF Detection
1 check
Ready to ship secure?
Start with a free scan. No account required. See exactly what AI left exposed.
API Base URL
https://boringsec.com/api/v1Authentication: Authorization: Bearer bsk_your_key. Rate limits: Pro 100/hr, Team 500/hr, Enterprise 2000/hr.