Find exposed admin routes, unauthenticated APIs, sequential IDs, and mass data exposure.
Insecure Direct Object Reference (IDOR) happens when routes trust user-supplied IDs instead of verifying ownership. This scanner safely probes common admin/API routes and discovered endpoints for broken access control signals.
Checks exposed admin panels, API documentation, unauthenticated API routes, sequential numeric IDs, mass-list endpoints, dangerous methods, and robots.txt entries that reveal internal paths.
Broken access control is the top OWASP risk. It turns normal user accounts or public endpoints into data-extraction paths when server-side ownership checks are missing.
Get a full security report with remediation guidance in 30 seconds. No setup required.
Use two authenticated test actors to verify tenant-scoped resources cannot be read across accounts.
Vulnerability DetectionTest your login, signup, and password reset flows for common security weaknesses.
Configuration AuditAudit your Supabase project for RLS misconfigurations, exposed APIs, and insecure auth settings.