supabase

Supabase production-launch security checklist

Supabase exposes more functionality by default than most "BaaS" tools, which is great for prototyping and dangerous for unaudited production launches. These ten checks focus on the project-level configuration, not application code.

10 checks

Tick through each one

Click any item to open the detailed fix guide. The detector tag shows which scanner module flips the state pass or fail when you run a SafeToShip scan.

Paste this into Supabase

One prompt that runs the entire checklist as a code review pass.

Audit my Supabase project: enable RLS on every public schema table with explicit policies, audit Storage public vs private buckets and add policies on private ones, confirm the service_role key is never used client-side, rotate the project JWT secret if untouched since creation, remove any leftover test auth providers, verify auth email templates send from your verified sending domain (with SPF/DMARC published), configure custom rate limits on auth/signup, and enable point-in-time recovery (Pro plan).

FAQ

Frequently asked questions

Should I rotate the JWT secret on every project?
If the project was created on a shared dev account, yes — rotating the JWT secret invalidates all existing tokens, forcing fresh sign-in. Plan a brief sign-out window before rotating.

Run the scan to confirm each check

60 seconds. Free. No account required.