Built with Firebase?

Security scanning for Firebase apps

Firebase makes real-time apps easy, but misconfigured Firestore rules and open Storage buckets are the top security issues we find in Firebase projects.

Free scan. No account required.

Common issues

Top vulnerabilities in Firebase apps

These are the three most common security issues we find when scanning Firebase projects.

Firestore security rules allowing unauthenticated reads and writes

Firebase API keys exposed in client code with overly permissive access

Cloud Storage buckets with public listing enabled for all files

How it works

60-second security audit

01

Paste your URL

Enter your Firebase app URL. We handle the rest.

02

Get your score

10 security modules run in parallel against your live site.

03

Fix with AI prompts

Copy the fix prompts into your AI tool and ship secure.

10 security modules, one scan

Every scan checks security headers, SSL/TLS, exposed files, JavaScript secrets, Supabase & Firebase configs, CORS, cookies, email security, and tech detection.

See all security checks

FAQ

Firebase security FAQ

Is it OK that my Firebase config is in my HTML?
Yes — the web config (apiKey, authDomain, projectId) is public by design. What matters is that your Firestore and Storage rules require authentication and scope access to the right user.
How do I know if my Firestore rules are too permissive?
Open Firebase Console → Firestore → Rules. Look for `allow read` or `allow write: if true` — those are wide open. Rules should reference `request.auth` and check ownership fields like `authorId` or `userId`.

Scan your Firebase app now

Find security issues before your users do. It takes 60 seconds and your first scan is free.