Security Checklists
Printable security verification lists
45 articlesAcquired Codebase Security Checklist: 20-Item Audit Guide
Security audit checklist for acquired codebases. Review credentials, dependencies, access controls, and vulnerabilities before integrating inherited projects.
AI Generated Code Security Checklist: 15-Item Guide Before Production
Security checklist for reviewing AI-generated code from Cursor, Bolt, Lovable, ChatGPT, or any AI coding tool before deploying to production.
API Security Checklist: 26-Item Guide for REST & GraphQL
Printable 26-item API security checklist for REST and GraphQL APIs. Authentication, authorization, input validation, rate limiting, and CORS configuration.
Authentication Security Checklist: 29-Item Guide
Complete authentication security checklist. Password handling, session management, OAuth configuration, MFA, and secure password reset flows.
Bolt.new Security Checklist: 15-Item Guide Before Deploying
Printable 15-item security checklist for Bolt.new apps. Critical items to check before deploying your AI-generated application to production.
Chrome Extension Security Checklist: 15-Item Guide for Safe Extensions
Security checklist for Chrome and browser extensions. Minimize permissions, protect user data, and follow Chrome Web Store security requirements.
Cursor Security Checklist: 15-Item Guide Before Deploying
Printable 15-item security checklist for Cursor projects. Critical items to check before deploying your AI-generated app to production.
Database Security Checklist: 18-Item Guide for Production
Comprehensive database security checklist for production apps. Covers PostgreSQL, MySQL, MongoDB, Supabase, Firebase, and more.
Domain Transfer Security Checklist: 16-Item Guide to Safe Transfers
Domain transfer security checklist for startups. Protect your domain during transfers, registrar changes, and DNS migrations with this step-by-step guide.
E-commerce Security Checklist: 18-Item Guide for Online Stores
Security checklist for e-commerce websites and online stores. Protect customer payment data, prevent fraud, and ensure PCI compliance for your shop.
Environment Variables Security Checklist: 23-Item Guide
Complete environment variables security checklist. .env file handling, production secrets, build-time vs runtime variables, and common mistakes to avoid.
File Upload Security Checklist: 14-Item Guide for Safe Uploads
Security checklist for file uploads. Validate file types, scan for malware, secure storage, and prevent common file upload vulnerabilities in your application.
Firebase Security Checklist: 20-Item Guide for Firestore, Auth & Storage
Complete 20-item Firebase security checklist. Security rules for Firestore, Storage buckets, Authentication configuration, and Cloud Functions security.
First Users Security Checklist: 12-Item Guide Before Your First Signup
Security checklist before accepting your first users. Essential security measures to protect your earliest adopters and your reputation.
Freelancer Handoff Security Checklist: 18-Item Guide
Security checklist for receiving code from freelancers. Revoke access, audit credentials, review code quality, and secure your project after handoff.
GDPR Compliance Checklist: 16-Item Guide for Startups
GDPR compliance checklist for startups and small teams. Understand your obligations, implement required features, and protect EU user data correctly.
GitHub Repository Security Checklist: 15-Item Guide to Protect Your Code
Security checklist for GitHub repositories. Protect your code, secrets, and access controls before making a repo public or adding collaborators.
Incident Response Checklist: 16-Item Guide for Security Incidents
Step-by-step incident response checklist. What to do when you discover a security incident: contain, investigate, remediate, and communicate.
Investor Demo Security Checklist: 10-Item Guide Before Your Pitch
Security checklist for investor demos and pitches. Make sure your demo environment is secure and professional before showing your product to potential investors.
Lovable Security Checklist: 15-Item Guide Before Deploying
Printable 15-item security checklist for Lovable (GPT Engineer) apps. Check these critical items before deploying your AI-generated application to production.
Mobile App Security Checklist: 16-Item Guide for iOS and Android
Security checklist for mobile applications. Protect your iOS and Android app from reverse engineering, secure local storage, and safely communicate with your backend.
Monthly Security Checklist: 15-Item Guide for Deep Audits
Monthly security audit checklist. A deeper security review to complement your weekly checks and catch issues before they become breaches.
MVP Security Checklist: 12-Item Guide for Minimum Viable Security
Security checklist for MVPs. The minimum security you need before launching your minimum viable product to real users.
Netlify Security Checklist: 15-Item Guide Before Deploying
Security checklist for Netlify deployments. Check these 15 items to secure your static site or Jamstack application on Netlify.
Next.js Security Checklist: 18-Item Guide for App Router & Pages Router
Complete Next.js security checklist for both App Router and Pages Router. API routes, middleware, server components, and security headers.
Open Source Security Checklist: 14-Item Guide Before Going Public
Security checklist for open source projects. Remove secrets, secure your repo settings, and prepare your codebase before making it public on GitHub.
Password Reset Security Checklist: 16-Item Guide
Password reset security checklist. Implement secure token generation, expiration, rate limiting, and user notification to prevent account takeover attacks.
Payment Integration Security Checklist: 15-Item Guide Before Adding Stripe
Security checklist before integrating Stripe or other payment processors. Protect your customers' payment data and your business.
Post-Incident Security Checklist: 18-Item Guide for Recovery
Post-incident security checklist for after a breach. Conduct post-mortem, strengthen defenses, communicate with users, and prevent future incidents.
Pre-Deployment Security Checklist: 26-Item Guide Before Going Live
Complete pre-deployment security checklist for web applications. 26 essential items to check before deploying your vibe-coded app to production.
Production Launch Security Checklist: 18-Item Guide Before Going Live
Security checklist for production launches. Complete these essential security checks before deploying your application to production and accepting real users.
Railway Security Checklist: 15-Item Guide Before Deploying
Security checklist for Railway deployments. Check these 15 items to secure your backend, databases, and services on Railway.
React Security Checklist: 20-Item Guide for XSS, Forms & State
Complete React security checklist. XSS prevention, dangerouslySetInnerHTML, form handling, state management, and dependency security.
Replit Security Checklist: 15-Item Guide Before Deploying
Security checklist for Replit deployments. Check these 15 critical items before taking your Replit app to production.
SaaS Security Checklist: 20-Item Guide for Multi-Tenant Apps
Security checklist for SaaS applications. Cover tenant isolation, data security, authentication, and compliance requirements for multi-tenant software.
SOC 2 Basics Checklist: 20-Item Guide for Startups
SOC 2 basics checklist for startups. Understand the trust service criteria, implement essential controls, and prepare for your first SOC 2 audit.
Startup Security Checklist: 18-Item Guide for Early-Stage Founders
Security checklist for startups and early-stage founders. Protect your app, users, and reputation from day one without slowing down your launch timeline.
Supabase Security Checklist: 24-Item Guide for RLS and Beyond
Complete 24-item Supabase security checklist covering Row Level Security, API key handling, storage rules, and database security. Essential for vibe coders.
Team Access Security Checklist: 14-Item Guide for Managing Permissions
Security checklist for managing team access and permissions. Control who can access what, implement least privilege, and handle onboarding and offboarding securely.
Third-Party API Security Checklist: 14-Item Guide for Safe Integrations
Security checklist for third-party API integrations. Securely connect to external services, handle credentials properly, and protect your app from API failures.
User Data Security Checklist: 16-Item Guide for Protecting User Information
Security checklist for handling user data. Protect personal information, implement proper access controls, and comply with privacy regulations like GDPR and CCPA.
v0 Security Checklist: 12-Item Guide Before Using Components
Security checklist for v0 by Vercel generated components. Check these 12 items before integrating AI-generated UI components into your production app.
Vercel Security Checklist: 15-Item Guide Before Deploying
Security checklist for Vercel deployments. Check these 15 items to secure your Next.js, React, or other apps on Vercel.
Webhook Security Checklist: 12-Item Guide for Safe Integrations
Security checklist for webhook endpoints. Verify signatures, validate payloads, handle retries, and protect your application from webhook spoofing attacks.
Weekly Security Checklist: 10-Item Guide for Quick Reviews
A quick weekly security checklist for developers. Spend 10 minutes each week maintaining your app's security posture.