How we found +2k vulns, 400+ secrets and 175 PII instances in publicly exposed apps built on vibe-coded platforms (Research methodology)
通过扫描前端与后端集成发现2k中等漏洞、98个高危问题、400+暴露密钥及175个PII实例,并确认BOLA、SSRF等漏洞。 2025-10-30 15:53:10 Author: www.reddit.com(查看原文) 阅读量:2 收藏

I think one of the interesting parts in methodology is that due to structure of the integration between Lovable front-ends and Supabase backends via API, and the fact that certain high-value signals (for example, anonymous JWTs to APIs linking Supabase backends) only appear in frontend bundles or source output, we needed to introduce a lightweight, read-only scan to harvest these artifacts and feed them back into the attack surface management inventory.

Here is the blog article that describes our methodology in depth. 

In a nutshell, we found: 

- 2k medium vulns, 98 highly critical issues 

- 400+ exposed secrets

- 175 instances of PII (including bank details and medical info)

- Several confirmed BOLA, SSRF, 0-click account takeover and others


文章来源: https://www.reddit.com/r/netsec/comments/1ok3ffd/how_we_found_2k_vulns_400_secrets_and_175_pii/
如有侵权请联系:admin#unsafe.sh