bolt + firebase

Bolt + Firebase pre-launch security checklist

A Bolt-generated Firebase app frequently lands with read/write rules set to true for the whole database. Combined with auth misconfiguration, that is a public dataset waiting for indexers. Walk this checklist before launch.

Paste this into Bolt

One prompt that runs the entire checklist as a code review pass.

Audit my Bolt + Firebase app: replace the default-allow Firestore and Storage rules with per-document scoped policies (e.g. allow read, write: if request.auth != null && request.auth.uid == resource.data.ownerId), confirm no service-account JSON file is committed or bundled, ensure the Firebase config object only contains the public apiKey + projectId values, enable App Check for client-only access, prevent .env exposure, allowlist CORS origins on custom Cloud Functions, set CSP/HSTS at the hosting layer, set Secure+HttpOnly on session cookies, and confirm TLS validity.

FAQ

Frequently asked questions

Are Firebase API keys actually public?
Yes — the apiKey in firebaseConfig is designed to identify your project, not authenticate. Anyone can have it. Security comes from Firestore/Storage rules and App Check, not the key.
Do I need App Check?
For consumer apps, yes. App Check verifies traffic comes from your registered app, not curl scripts. Without it, attackers can hammer your Firestore rules from any client and burn quota.

Run the scan to confirm each check

60 seconds. Free. No account required.