[{"data":1,"prerenderedAt":248},["ShallowReactive",2],{"blog-category-blueprints":3},[4,10,14,20,24,30,34,39,43,47,51,55,60,64,68,73,77,81,85,91,96,100,104,108,113,117,121,125,130,134,138,142,146,151,155,159,163,168,172,176,180,184,188,192,196,201,206,210,214,218,222,227,231,236,240,244],{"path":5,"title":6,"description":7,"date":8,"readTime":9},"/blog/blueprints/vue-firebase","Vue + Firebase Security Blueprint","Security guide for Vue + Firebase stack. Configure Firestore rules, handle authentication with VueFire, protect routes, and secure your Vue SPA.","2026-02-13","9 min read",{"path":11,"title":12,"description":13,"date":8,"readTime":9},"/blog/blueprints/vue-supabase","Vue + Supabase Security Blueprint","Security guide for Vue + Supabase stack. Configure RLS, handle authentication with Pinia, protect routes with vue-router guards, and secure your Vue SPA.",{"path":15,"title":16,"description":17,"date":18,"readTime":19},"/blog/blueprints/sendgrid-integration","SendGrid Integration Security Guide","Security guide for SendGrid email integration. Validate webhooks, protect API keys, prevent email injection, configure DKIM/SPF, and secure your email infrastructure.","2026-02-12","10 min read",{"path":21,"title":22,"description":23,"date":18,"readTime":19},"/blog/blueprints/twilio-integration","Twilio Integration Security Guide","Security guide for Twilio SMS and voice integration. Validate webhook signatures, protect API credentials, prevent SMS pumping, and secure your Twilio implementation.",{"path":25,"title":26,"description":27,"date":28,"readTime":29},"/blog/blueprints/nextjs-supabase-vercel","Next.js + Supabase + Vercel Security Blueprint","Security guide for Next.js + Supabase + Vercel stack. Configure RLS, secure Server Components and Actions, protect API routes, and deploy safely.","2026-02-11","12 min read",{"path":31,"title":32,"description":33,"date":28,"readTime":19},"/blog/blueprints/redis-sessions","Redis Session Security Guide","Security guide for Redis session management. Configure secure connections, implement session rotation, prevent fixation attacks, and manage session data safely.",{"path":35,"title":36,"description":37,"date":28,"readTime":38},"/blog/blueprints/s3-uploads","S3 Secure Uploads Guide","Security guide for AWS S3 file uploads. Use presigned URLs, validate file types server-side, configure bucket policies, prevent path traversal, and secure your uploads.","11 min read",{"path":40,"title":41,"description":42,"date":28,"readTime":29},"/blog/blueprints/stripe-webhooks","Stripe Webhooks Security Guide","Comprehensive security guide for Stripe webhook handling. Verify signatures, handle events idempotently, secure endpoint configuration, and prevent replay attacks.",{"path":44,"title":45,"description":46,"date":28,"readTime":38},"/blog/blueprints/supabase-stripe","Supabase + Stripe Integration Security","Security guide for integrating Stripe payments with Supabase. Secure webhook handling, verify signatures, sync subscription data safely, and protect payment flows.",{"path":48,"title":49,"description":50,"date":28,"readTime":19},"/blog/blueprints/sveltekit-supabase","SvelteKit + Supabase Security Blueprint","Security guide for SvelteKit + Supabase stack. Configure RLS, handle auth with hooks, protect server routes and form actions, and secure your SvelteKit app.",{"path":52,"title":53,"description":54,"date":28,"readTime":29},"/blog/blueprints/t3-stack","T3 Stack Security Blueprint","Security guide for T3 Stack (Next.js, tRPC, Prisma, NextAuth). Protect tRPC procedures, configure Prisma safely, implement NextAuth patterns, and secure your T3 app.",{"path":56,"title":57,"description":58,"date":59,"readTime":19},"/blog/blueprints/nuxt-supabase","Nuxt + Supabase Security Blueprint","Security guide for Nuxt + Supabase stack. Configure RLS, use @nuxtjs/supabase module, protect server routes and API endpoints, and secure your Nuxt app.","2026-02-10",{"path":61,"title":62,"description":63,"date":59,"readTime":9},"/blog/blueprints/react-supabase","React + Supabase Security Blueprint","Security guide for React + Supabase stack. Configure RLS, handle authentication, protect client-side data, and secure your React SPA.",{"path":65,"title":66,"description":67,"date":59,"readTime":19},"/blog/blueprints/remix-supabase","Remix + Supabase Security Blueprint","Security guide for Remix + Supabase stack. Configure RLS, handle auth in loaders and actions, use session cookies, and secure your full-stack Remix app.",{"path":69,"title":70,"description":71,"date":72,"readTime":19},"/blog/blueprints/nextjs-firebase","Next.js + Firebase Security Blueprint","Security guide for Next.js + Firebase stack. Configure Firestore rules, use Firebase Admin SDK safely, handle authentication, and secure your deployment.","2026-02-09",{"path":74,"title":75,"description":76,"date":72,"readTime":19},"/blog/blueprints/nextjs-prisma-planetscale","Next.js + Prisma + PlanetScale Security Blueprint","Security guide for Next.js + Prisma + PlanetScale stack. Configure database connections, secure API routes, implement authorization, and deploy safely.",{"path":78,"title":79,"description":80,"date":72,"readTime":29},"/blog/blueprints/oauth-integrations","OAuth Integration Security Guide","Security guide for OAuth provider integrations. Implement PKCE flow, validate state parameters, handle tokens securely, and protect against common OAuth vulnerabilities.",{"path":82,"title":83,"description":84,"date":72,"readTime":9},"/blog/blueprints/react-firebase","React + Firebase Security Blueprint","Security guide for React + Firebase stack. Configure Firestore rules, handle authentication, protect client-side data, and secure your React SPA.",{"path":86,"title":87,"description":88,"date":89,"readTime":90},"/blog/blueprints/lovable-netlify","Lovable + Netlify Security Blueprint","Security guide for deploying Lovable apps to Netlify. Configure environment variables, set up headers, secure functions, and protect your deployment.","2026-02-06","8 min read",{"path":92,"title":93,"description":94,"date":89,"readTime":95},"/blog/blueprints/lovable-tailwind","Lovable + Tailwind CSS Security Blueprint","Security guide for Lovable + Tailwind CSS stack. Understand CSS-related security concerns, XSS prevention, and safe class handling in AI-generated code.","6 min read",{"path":97,"title":98,"description":99,"date":89,"readTime":29},"/blog/blueprints/mean-stack","MEAN Stack Security Blueprint","Security guide for MEAN Stack (MongoDB, Express, Angular, Node.js). Prevent NoSQL injection, secure Angular apps, implement JWT auth, and protect your MEAN app.",{"path":101,"title":102,"description":103,"date":89,"readTime":29},"/blog/blueprints/mern-stack","MERN Stack Security Blueprint","Security guide for MERN Stack (MongoDB, Express, React, Node.js). Prevent NoSQL injection, secure Express APIs, implement JWT auth, and protect your MERN app.",{"path":105,"title":106,"description":107,"date":89,"readTime":38},"/blog/blueprints/nextauth-prisma","NextAuth + Prisma Integration Security","Security guide for integrating NextAuth.js with Prisma. Configure database sessions, protect API routes, implement callbacks securely, and manage user data safely.",{"path":109,"title":110,"description":111,"date":112,"readTime":9},"/blog/blueprints/jamstack-supabase","Jamstack + Supabase Security Blueprint","Security guide for Jamstack sites with Supabase backend. Configure RLS for static sites, secure edge functions, implement client-side auth safely, and protect your Jamstack app.","2026-02-05",{"path":114,"title":115,"description":116,"date":112,"readTime":19},"/blog/blueprints/lovable-firebase","Lovable + Firebase Security Blueprint","Security guide for Lovable + Firebase stack. Configure Firestore rules, protect credentials, handle authentication, and secure your Lovable-generated Firebase app.",{"path":118,"title":119,"description":120,"date":112,"readTime":95},"/blog/blueprints/lovable-shadcn","Lovable + shadcn/ui Security Blueprint","Security guide for Lovable + shadcn/ui stack. Understand component security, form handling, and safe practices for AI-generated UI code.",{"path":122,"title":123,"description":124,"date":112,"readTime":19},"/blog/blueprints/lovable-supabase","Lovable + Supabase Security Blueprint","Security guide for Lovable + Supabase stack. Configure RLS policies, protect API keys, handle authentication, and secure your Lovable-generated Supabase app.",{"path":126,"title":127,"description":128,"date":129,"readTime":19},"/blog/blueprints/cursor-react-firebase","Cursor + React + Firebase Security Blueprint","Security guide for Cursor + React + Firebase stack. Configure Firestore rules, secure React components, protect Firebase credentials, and handle client-side auth properly.","2026-02-04",{"path":131,"title":132,"description":133,"date":129,"readTime":38},"/blog/blueprints/firebase-stripe","Firebase + Stripe Integration Security","Security guide for integrating Stripe payments with Firebase. Secure Cloud Function webhooks, verify signatures, sync subscription data, and protect payment flows.",{"path":135,"title":136,"description":137,"date":129,"readTime":9},"/blog/blueprints/lovable-auth0","Lovable + Auth0 Security Blueprint","Security guide for Lovable + Auth0 stack. Configure Auth0 applications, secure callbacks, handle tokens properly, and protect your Lovable-generated app.",{"path":139,"title":140,"description":141,"date":129,"readTime":19},"/blog/blueprints/lovable-stripe","Lovable + Stripe Security Blueprint","Security guide for Lovable + Stripe integration. Protect API keys, verify webhooks, handle PCI compliance, and secure payment flows in your Lovable app.",{"path":143,"title":144,"description":145,"date":129,"readTime":90},"/blog/blueprints/lovable-vercel","Lovable + Vercel Security Blueprint","Security guide for deploying Lovable apps to Vercel. Configure environment variables, set up headers, secure serverless functions, and protect your deployment.",{"path":147,"title":148,"description":149,"date":150,"readTime":9},"/blog/blueprints/cursor-planetscale-vercel","Cursor + PlanetScale + Vercel Security Blueprint","Security guide for Cursor + PlanetScale + Vercel stack. Configure database connections, secure API routes, protect credentials, and deploy safely with branching workflows.","2026-02-02",{"path":152,"title":153,"description":154,"date":150,"readTime":19},"/blog/blueprints/cursor-prisma-vercel","Cursor + Prisma + Vercel Security Blueprint","Security guide for Cursor + Prisma + Vercel stack. Secure your database connection, configure Prisma safely, protect against injection, and deploy securely.",{"path":156,"title":157,"description":158,"date":150,"readTime":19},"/blog/blueprints/cursor-supabase-netlify","Cursor + Supabase + Netlify Security Blueprint","Security guide for Cursor + Supabase + Netlify stack. Configure RLS, set up Netlify headers, protect environment variables, and secure your deployment.",{"path":160,"title":161,"description":162,"date":150,"readTime":29},"/blog/blueprints/cursor-supabase-vercel","Cursor + Supabase + Vercel Security Blueprint","Complete security blueprint for the Cursor + Supabase + Vercel stack. Learn to configure RLS, protect API keys, set security headers, and deploy securely.",{"path":164,"title":165,"description":166,"date":167,"readTime":90},"/blog/blueprints/bolt-vercel","Bolt.new + Vercel Security Blueprint","Security guide for deploying Bolt.new apps to Vercel. Configure environment variables, secure API routes, set up headers, and protect your deployment.","2026-01-30",{"path":169,"title":170,"description":171,"date":167,"readTime":19},"/blog/blueprints/clerk-nextjs","Clerk + Next.js Integration Security","Security guide for integrating Clerk with Next.js. Configure middleware properly, protect API routes, use auth() in Server Components, and implement secure user management.",{"path":173,"title":174,"description":175,"date":167,"readTime":19},"/blog/blueprints/cloudflare-workers","Cloudflare Workers Security Guide","Security guide for Cloudflare Workers. Protect secrets, handle authentication at the edge, validate requests, implement rate limiting, and secure your edge functions.",{"path":177,"title":178,"description":179,"date":167,"readTime":38},"/blog/blueprints/cursor-convex","Cursor + Convex Security Blueprint","Security guide for Cursor + Convex stack. Configure Convex functions securely, implement authentication, protect data access patterns, and deploy with confidence.",{"path":181,"title":182,"description":183,"date":167,"readTime":38},"/blog/blueprints/cursor-firebase-vercel","Cursor + Firebase + Vercel Security Blueprint","Complete security guide for the Cursor + Firebase + Vercel stack. Configure Firestore rules, protect Firebase credentials, and deploy securely to Vercel.",{"path":185,"title":186,"description":187,"date":167,"readTime":19},"/blog/blueprints/cursor-mongodb-railway","Cursor + MongoDB + Railway Security Blueprint","Security guide for Cursor + MongoDB + Railway stack. Secure your connection string, configure network access, enable authentication, and deploy safely.",{"path":189,"title":190,"description":191,"date":167,"readTime":19},"/blog/blueprints/cursor-neon-railway","Cursor + Neon + Railway Security Blueprint","Security guide for Cursor + Neon + Railway stack. Configure Postgres connections, secure serverless functions, protect credentials, and deploy with branching databases.",{"path":193,"title":194,"description":195,"date":167,"readTime":29},"/blog/blueprints/cursor-nextjs-supabase","Cursor + Next.js + Supabase Security Blueprint","Security guide for Cursor + Next.js + Supabase stack. Configure RLS, secure Server Components, protect API routes, and handle authentication properly.",{"path":197,"title":198,"description":199,"date":200,"readTime":29},"/blog/blueprints/bolt-supabase-vercel","Bolt.new + Supabase + Vercel Security Blueprint","Complete security guide for the Bolt.new + Supabase + Vercel stack. Learn to configure RLS, protect API keys, set security headers, and deploy securely.","2026-01-29",{"path":202,"title":203,"description":204,"date":205,"readTime":19},"/blog/blueprints/bolt-mongodb","Bolt.new + MongoDB Security Blueprint","Security guide for Bolt.new + MongoDB stack. Secure connection strings, prevent NoSQL injection, implement authorization, and protect your Bolt-generated MongoDB app.","2026-01-28",{"path":207,"title":208,"description":209,"date":205,"readTime":90},"/blog/blueprints/bolt-netlify","Bolt.new + Netlify Security Blueprint","Security guide for deploying Bolt.new apps to Netlify. Configure environment variables, set up headers, secure Netlify Functions, and protect your deployment.",{"path":211,"title":212,"description":213,"date":205,"readTime":9},"/blog/blueprints/bolt-planetscale","Bolt.new + PlanetScale Security Blueprint","Security guide for Bolt.new + PlanetScale stack. Secure database connections, protect credentials, implement authorization, and safely deploy your Bolt-generated app.",{"path":215,"title":216,"description":217,"date":205,"readTime":19},"/blog/blueprints/bolt-react-firebase","Bolt.new + React + Firebase Security Blueprint","Security guide for Bolt.new + React + Firebase stack. Configure Firestore rules, secure React components, handle auth state, and protect your Bolt-generated React app.",{"path":219,"title":220,"description":221,"date":205,"readTime":19},"/blog/blueprints/bolt-supabase","Bolt.new + Supabase Security Blueprint","Security guide for Bolt.new + Supabase stack. Configure RLS policies, protect API keys, handle authentication, and secure your Bolt-generated Supabase app.",{"path":223,"title":224,"description":225,"date":226,"readTime":38},"/blog/blueprints/bolt-nextjs-supabase","Bolt.new + Next.js + Supabase Security Blueprint","Security guide for Bolt.new + Next.js + Supabase stack. Configure RLS, secure Server Components, protect API routes, and handle authentication properly.","2026-01-27",{"path":228,"title":229,"description":230,"date":226,"readTime":90},"/blog/blueprints/bolt-railway","Bolt.new + Railway Security Blueprint","Security guide for deploying Bolt.new apps to Railway. Configure environment variables, secure services, set up databases, and protect your deployment.",{"path":232,"title":233,"description":234,"date":235,"readTime":19},"/blog/blueprints/astro-supabase","Astro + Supabase Security Blueprint","Security guide for Astro sites with Supabase. Configure RLS, secure server endpoints, handle hybrid rendering auth, and protect your Astro app with proper security patterns.","2026-01-26",{"path":237,"title":238,"description":239,"date":235,"readTime":19},"/blog/blueprints/auth0-nextjs","Auth0 + Next.js Integration Security","Security guide for integrating Auth0 with Next.js. Configure @auth0/nextjs-auth0, protect API routes, handle tokens securely, and implement proper session management.",{"path":241,"title":242,"description":243,"date":235,"readTime":19},"/blog/blueprints/bolt-convex","Bolt.new + Convex Security Blueprint","Security guide for Bolt.new + Convex stack. Configure function visibility, implement authentication, protect data access, and secure your Bolt-generated Convex app.",{"path":245,"title":246,"description":247,"date":235,"readTime":19},"/blog/blueprints/bolt-firebase","Bolt.new + Firebase Security Blueprint","Security guide for Bolt.new + Firebase stack. Configure Firestore rules, protect credentials, handle authentication, and secure your Bolt-generated Firebase app.",1775843918546]