[{"data":1,"prerenderedAt":198},["ShallowReactive",2],{"blog-category-checklists":3},[4,10,14,18,22,27,31,36,40,44,49,53,57,61,66,70,74,78,83,87,91,95,100,104,108,112,116,121,125,129,134,138,142,147,151,155,159,163,168,172,176,180,185,189,194],{"path":5,"title":6,"description":7,"date":8,"readTime":9},"/blog/checklists/third-party-api-checklist","Third-Party API Security Checklist: 14-Item Guide for Safe Integrations","Security checklist for third-party API integrations. Securely connect to external services, handle credentials properly, and protect your app from API failures.","2026-02-09",null,{"path":11,"title":12,"description":13,"date":8,"readTime":9},"/blog/checklists/v0-security-checklist","v0 Security Checklist: 12-Item Guide Before Using Components","Security checklist for v0 by Vercel generated components. Check these 12 items before integrating AI-generated UI components into your production app.",{"path":15,"title":16,"description":17,"date":8,"readTime":9},"/blog/checklists/webhook-security-checklist","Webhook Security Checklist: 12-Item Guide for Safe Integrations","Security checklist for webhook endpoints. Verify signatures, validate payloads, handle retries, and protect your application from webhook spoofing attacks.",{"path":19,"title":20,"description":21,"date":8,"readTime":9},"/blog/checklists/weekly-security-checklist","Weekly Security Checklist: 10-Item Guide for Quick Reviews","A quick weekly security checklist for developers. Spend 10 minutes each week maintaining your app's security posture.",{"path":23,"title":24,"description":25,"date":26,"readTime":9},"/blog/checklists/supabase-security-checklist","Supabase Security Checklist: 24-Item Guide for RLS and Beyond","Complete 24-item Supabase security checklist covering Row Level Security, API key handling, storage rules, and database security. Essential for vibe coders.","2026-02-06",{"path":28,"title":29,"description":30,"date":26,"readTime":9},"/blog/checklists/user-data-checklist","User Data Security Checklist: 16-Item Guide for Protecting User Information","Security checklist for handling user data. Protect personal information, implement proper access controls, and comply with privacy regulations like GDPR and CCPA.",{"path":32,"title":33,"description":34,"date":35,"readTime":9},"/blog/checklists/soc2-basics-checklist","SOC 2 Basics Checklist: 20-Item Guide for Startups","SOC 2 basics checklist for startups. Understand the trust service criteria, implement essential controls, and prepare for your first SOC 2 audit.","2026-02-05",{"path":37,"title":38,"description":39,"date":35,"readTime":9},"/blog/checklists/team-access-checklist","Team Access Security Checklist: 14-Item Guide for Managing Permissions","Security checklist for managing team access and permissions. Control who can access what, implement least privilege, and handle onboarding and offboarding securely.",{"path":41,"title":42,"description":43,"date":35,"readTime":9},"/blog/checklists/vercel-security-checklist","Vercel Security Checklist: 15-Item Guide Before Deploying","Security checklist for Vercel deployments. Check these 15 items to secure your Next.js, React, or other apps on Vercel.",{"path":45,"title":46,"description":47,"date":48,"readTime":9},"/blog/checklists/payment-integration-checklist","Payment Integration Security Checklist: 15-Item Guide Before Adding Stripe","Security checklist before integrating Stripe or other payment processors. Protect your customers' payment data and your business.","2026-02-04",{"path":50,"title":51,"description":52,"date":48,"readTime":9},"/blog/checklists/production-checklist","Production Launch Security Checklist: 18-Item Guide Before Going Live","Security checklist for production launches. Complete these essential security checks before deploying your application to production and accepting real users.",{"path":54,"title":55,"description":56,"date":48,"readTime":9},"/blog/checklists/replit-security-checklist","Replit Security Checklist: 15-Item Guide Before Deploying","Security checklist for Replit deployments. Check these 15 critical items before taking your Replit app to production.",{"path":58,"title":59,"description":60,"date":48,"readTime":9},"/blog/checklists/startup-security-checklist","Startup Security Checklist: 18-Item Guide for Early-Stage Founders","Security checklist for startups and early-stage founders. Protect your app, users, and reputation from day one without slowing down your launch timeline.",{"path":62,"title":63,"description":64,"date":65,"readTime":9},"/blog/checklists/pre-deployment-security-checklist","Pre-Deployment Security Checklist: 26-Item Guide Before Going Live","Complete pre-deployment security checklist for web applications. 26 essential items to check before deploying your vibe-coded app to production.","2026-02-03",{"path":67,"title":68,"description":69,"date":65,"readTime":9},"/blog/checklists/railway-security-checklist","Railway Security Checklist: 15-Item Guide Before Deploying","Security checklist for Railway deployments. Check these 15 items to secure your backend, databases, and services on Railway.",{"path":71,"title":72,"description":73,"date":65,"readTime":9},"/blog/checklists/react-security-checklist","React Security Checklist: 20-Item Guide for XSS, Forms & State","Complete React security checklist. XSS prevention, dangerouslySetInnerHTML, form handling, state management, and dependency security.",{"path":75,"title":76,"description":77,"date":65,"readTime":9},"/blog/checklists/saas-security-checklist","SaaS Security Checklist: 20-Item Guide for Multi-Tenant Apps","Security checklist for SaaS applications. Cover tenant isolation, data security, authentication, and compliance requirements for multi-tenant software.",{"path":79,"title":80,"description":81,"date":82,"readTime":9},"/blog/checklists/mvp-security-checklist","MVP Security Checklist: 12-Item Guide for Minimum Viable Security","Security checklist for MVPs. The minimum security you need before launching your minimum viable product to real users.","2026-02-02",{"path":84,"title":85,"description":86,"date":82,"readTime":9},"/blog/checklists/netlify-security-checklist","Netlify Security Checklist: 15-Item Guide Before Deploying","Security checklist for Netlify deployments. Check these 15 items to secure your static site or Jamstack application on Netlify.",{"path":88,"title":89,"description":90,"date":82,"readTime":9},"/blog/checklists/password-reset-checklist","Password Reset Security Checklist: 16-Item Guide","Password reset security checklist. Implement secure token generation, expiration, rate limiting, and user notification to prevent account takeover attacks.",{"path":92,"title":93,"description":94,"date":82,"readTime":9},"/blog/checklists/post-incident-checklist","Post-Incident Security Checklist: 18-Item Guide for Recovery","Post-incident security checklist for after a breach. Conduct post-mortem, strengthen defenses, communicate with users, and prevent future incidents.",{"path":96,"title":97,"description":98,"date":99,"readTime":9},"/blog/checklists/investor-demo-checklist","Investor Demo Security Checklist: 10-Item Guide Before Your Pitch","Security checklist for investor demos and pitches. Make sure your demo environment is secure and professional before showing your product to potential investors.","2026-01-30",{"path":101,"title":102,"description":103,"date":99,"readTime":9},"/blog/checklists/lovable-security-checklist","Lovable Security Checklist: 15-Item Guide Before Deploying","Printable 15-item security checklist for Lovable (GPT Engineer) apps. Check these critical items before deploying your AI-generated application to production.",{"path":105,"title":106,"description":107,"date":99,"readTime":9},"/blog/checklists/mobile-app-security-checklist","Mobile App Security Checklist: 16-Item Guide for iOS and Android","Security checklist for mobile applications. Protect your iOS and Android app from reverse engineering, secure local storage, and safely communicate with your backend.",{"path":109,"title":110,"description":111,"date":99,"readTime":9},"/blog/checklists/nextjs-security-checklist","Next.js Security Checklist: 18-Item Guide for App Router & Pages Router","Complete Next.js security checklist for both App Router and Pages Router. API routes, middleware, server components, and security headers.",{"path":113,"title":114,"description":115,"date":99,"readTime":9},"/blog/checklists/open-source-checklist","Open Source Security Checklist: 14-Item Guide Before Going Public","Security checklist for open source projects. Remove secrets, secure your repo settings, and prepare your codebase before making it public on GitHub.",{"path":117,"title":118,"description":119,"date":120,"readTime":9},"/blog/checklists/file-upload-checklist","File Upload Security Checklist: 14-Item Guide for Safe Uploads","Security checklist for file uploads. Validate file types, scan for malware, secure storage, and prevent common file upload vulnerabilities in your application.","2026-01-29",{"path":122,"title":123,"description":124,"date":120,"readTime":9},"/blog/checklists/first-users-checklist","First Users Security Checklist: 12-Item Guide Before Your First Signup","Security checklist before accepting your first users. Essential security measures to protect your earliest adopters and your reputation.",{"path":126,"title":127,"description":128,"date":120,"readTime":9},"/blog/checklists/incident-response-checklist","Incident Response Checklist: 16-Item Guide for Security Incidents","Step-by-step incident response checklist. What to do when you discover a security incident: contain, investigate, remediate, and communicate.",{"path":130,"title":131,"description":132,"date":133,"readTime":9},"/blog/checklists/freelancer-handoff-checklist","Freelancer Handoff Security Checklist: 18-Item Guide","Security checklist for receiving code from freelancers. Revoke access, audit credentials, review code quality, and secure your project after handoff.","2026-01-28",{"path":135,"title":136,"description":137,"date":133,"readTime":9},"/blog/checklists/gdpr-checklist","GDPR Compliance Checklist: 16-Item Guide for Startups","GDPR compliance checklist for startups and small teams. Understand your obligations, implement required features, and protect EU user data correctly.",{"path":139,"title":140,"description":141,"date":133,"readTime":9},"/blog/checklists/monthly-security-checklist","Monthly Security Checklist: 15-Item Guide for Deep Audits","Monthly security audit checklist. A deeper security review to complement your weekly checks and catch issues before they become breaches.",{"path":143,"title":144,"description":145,"date":146,"readTime":9},"/blog/checklists/database-security-checklist","Database Security Checklist: 18-Item Guide for Production","Comprehensive database security checklist for production apps. Covers PostgreSQL, MySQL, MongoDB, Supabase, Firebase, and more.","2026-01-27",{"path":148,"title":149,"description":150,"date":146,"readTime":9},"/blog/checklists/ecommerce-security-checklist","E-commerce Security Checklist: 18-Item Guide for Online Stores","Security checklist for e-commerce websites and online stores. Protect customer payment data, prevent fraud, and ensure PCI compliance for your shop.",{"path":152,"title":153,"description":154,"date":146,"readTime":9},"/blog/checklists/environment-variables-checklist","Environment Variables Security Checklist: 23-Item Guide","Complete environment variables security checklist. .env file handling, production secrets, build-time vs runtime variables, and common mistakes to avoid.",{"path":156,"title":157,"description":158,"date":146,"readTime":9},"/blog/checklists/firebase-security-checklist","Firebase Security Checklist: 20-Item Guide for Firestore, Auth & Storage","Complete 20-item Firebase security checklist. Security rules for Firestore, Storage buckets, Authentication configuration, and Cloud Functions security.",{"path":160,"title":161,"description":162,"date":146,"readTime":9},"/blog/checklists/github-repo-checklist","GitHub Repository Security Checklist: 15-Item Guide to Protect Your Code","Security checklist for GitHub repositories. Protect your code, secrets, and access controls before making a repo public or adding collaborators.",{"path":164,"title":165,"description":166,"date":167,"readTime":9},"/blog/checklists/authentication-security-checklist","Authentication Security Checklist: 29-Item Guide","Complete authentication security checklist. Password handling, session management, OAuth configuration, MFA, and secure password reset flows.","2026-01-26",{"path":169,"title":170,"description":171,"date":167,"readTime":9},"/blog/checklists/bolt-security-checklist","Bolt.new Security Checklist: 15-Item Guide Before Deploying","Printable 15-item security checklist for Bolt.new apps. Critical items to check before deploying your AI-generated application to production.",{"path":173,"title":174,"description":175,"date":167,"readTime":9},"/blog/checklists/chrome-extension-checklist","Chrome Extension Security Checklist: 15-Item Guide for Safe Extensions","Security checklist for Chrome and browser extensions. Minimize permissions, protect user data, and follow Chrome Web Store security requirements.",{"path":177,"title":178,"description":179,"date":167,"readTime":9},"/blog/checklists/domain-transfer-checklist","Domain Transfer Security Checklist: 16-Item Guide to Safe Transfers","Domain transfer security checklist for startups. Protect your domain during transfers, registrar changes, and DNS migrations with this step-by-step guide.",{"path":181,"title":182,"description":183,"date":184,"readTime":9},"/blog/checklists/api-security-checklist","API Security Checklist: 26-Item Guide for REST & GraphQL","Printable 26-item API security checklist for REST and GraphQL APIs. Authentication, authorization, input validation, rate limiting, and CORS configuration.","2026-01-23",{"path":186,"title":187,"description":188,"date":184,"readTime":9},"/blog/checklists/cursor-security-checklist","Cursor Security Checklist: 15-Item Guide Before Deploying","Printable 15-item security checklist for Cursor projects. Critical items to check before deploying your AI-generated app to production.",{"path":190,"title":191,"description":192,"date":193,"readTime":9},"/blog/checklists/acquired-codebase-checklist","Acquired Codebase Security Checklist: 20-Item Audit Guide","Security audit checklist for acquired codebases. Review credentials, dependencies, access controls, and vulnerabilities before integrating inherited projects.","2026-01-22",{"path":195,"title":196,"description":197,"date":193,"readTime":9},"/blog/checklists/ai-generated-code-checklist","AI Generated Code Security Checklist: 15-Item Guide Before Production","Security checklist for reviewing AI-generated code from Cursor, Bolt, Lovable, ChatGPT, or any AI coding tool before deploying to production.",1775843918546]