Security Blog

Guides, stories, and tools to help you build secure apps — even when you're vibe coding.

589 articles across 14 topics
Breaking

How a Lovable App Exposed 18,000 Users, Including Students

A Lovable-hosted exam app had 16 vulnerabilities including backwards authentication logic that blocked logged-in users and let anonymous visitors access everything. 18,697 user records leaked, including K-12 students.

Read the full story →

Latest Articles

MCP Servers Are the New Attack Surface: How to Secure Your AI Tool Integrations

MCP servers give AI tools direct access to your infrastructure. Learn the security risks and how to protect your databases, APIs, and secrets from malicious MCP servers.

Best Practices

Vibe Coding Security Debt: Why 25% of AI-Generated Code Has Flaws (and How to Fix It)

Research shows 25% of AI-generated code contains security vulnerabilities. Learn the 5 most common flaws in vibe-coded apps and how to fix them before they cost you.

Best Practices

How Attackers Used AI to Breach 50,000 FortiGate Firewalls

In early 2025, AI-assisted attackers compromised 50,000 FortiGate firewalls in weeks. Here's what happened and why it matters for every app builder.

Security Stories

Why AI Code Generators Keep Exposing Your API Keys (and How to Stop It)

AI code generators like Cursor, Bolt, and Lovable frequently hardcode API keys in client-side code. Learn why this happens and 5 proven strategies to prevent it.

Best Practices

How Moltbook Exposed 1.5 Million API Keys in Client-Side Code

Moltbook launched with their Supabase database wide open. No Row Level Security. 1.5 million API keys exposed in client-side JavaScript. A basic scan would have caught this before launch.

Security Stories

API Security Best Practices: Authentication, Validation, and Rate Limiting

Essential API security best practices. Learn authentication patterns, input validation, rate limiting, and error handling for secure REST and GraphQL APIs.

Best Practices

How-To Guides

Step-by-step security guides for your stack

View all 67 articles →

Security Blueprints

Pre-built security configurations for common stacks

View all 56 articles →

AI Fix Prompts

Copy-paste prompts to fix security issues with AI coding tools

View all 55 articles →

Security Comparisons

Side-by-side security analysis of tools and services

View all 50 articles →

Security Glossary

Plain English definitions of security terms

View all 51 articles →

Tool & Platform Guides

Security guides for specific tools and platforms

View all 50 articles →

Security Checklists

Printable security verification lists

View all 45 articles →

Security Stories

Real-world security incidents and lessons

View all 38 articles →

Vulnerability Guides

Common security vulnerabilities explained

View all 36 articles →

Launch Security

Security checklists for shipping your app

View all 35 articles →

Is It Safe?

Security assessments of popular tools and services

View all 35 articles →

Security Cost Analysis

The financial impact of security issues

View all 25 articles →

Best Practices

Security best practices for modern web apps

View all 34 articles →

Getting Started

Start your security journey here

View all 12 articles →