Supabase Security Auditor
Analysis
This is a coherent, instruction-only Supabase security audit skill, with the main caution that it may inspect and surface sensitive Supabase keys from local project files.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
cat supabase/config.toml 2>/dev/null ls supabase/migrations/ 2>/dev/null | tail -10 grep -rn "createClient\|supabase\." src/ lib/ app/ | head -20
The skill suggests local shell commands to inspect project configuration and source code. These commands are read-only and aligned with the audit purpose, but they still access local files.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
grep -rn "SUPABASE_\|supabase\.\(url\|key\|anon\)" .env* src/ | head -10
The skill explicitly searches environment and source files for Supabase keys, including potentially sensitive service_role credentials. This is expected for an API key security audit, but the discovered values may be sensitive.
