[{"data":1,"prerenderedAt":237},["ShallowReactive",2],{"blog-category-guides":3},[4,10,16,22,27,32,38,42,47,52,56,60,65,70,74,79,83,87,91,96,102,106,110,114,119,123,128,132,136,141,145,149,153,158,162,166,171,175,180,185,189,193,197,201,206,210,214,219,224,229,233],{"path":5,"title":6,"description":7,"date":8,"readTime":9},"/blog/guides/kiro-security-guide","Kiro Security Guide: Securing AI-Generated Code from AWS","Security guide for Kiro, Amazon's spec-driven AI coding agent. Learn to lock down agent hooks, protect AWS credentials, and catch vulnerabilities before they ship.","2026-03-13","8 min read",{"path":11,"title":12,"description":13,"date":14,"readTime":15},"/blog/guides/future-of-ai-app-security-2026","The Future of AI App Security: Trends to Watch in 2026","AI-generated code is everywhere, and attackers know it. Here are the security trends shaping how we protect vibe-coded apps in 2026 and beyond.","2026-03-10","24 min read",{"path":17,"title":18,"description":19,"date":20,"readTime":21},"/blog/guides/webflow","Webflow Security Guide: Website Protection Basics","Security guide for Webflow users. Learn about form security, third-party integrations, and protecting your Webflow website from common vulnerabilities.","2026-02-03","5 min read",{"path":23,"title":24,"description":25,"date":20,"readTime":26},"/blog/guides/windsurf","Windsurf Security Guide: Securing AI-Generated Code","Complete security guide for Windsurf (Codeium). Learn to review AI-generated code, handle secrets safely, and avoid common security pitfalls in your Windsurf projects.","9 min read",{"path":28,"title":29,"description":30,"date":20,"readTime":31},"/blog/guides/xata","Xata Security Guide: Serverless Database Protection","Security guide for Xata users. Learn about API key protection, access control, and secure development with Xata's serverless database platform.","6 min read",{"path":33,"title":34,"description":35,"date":36,"readTime":37},"/blog/guides/turso","Turso Security Guide for Vibe Coders","Secure your Turso edge database when vibe coding. Learn token management, connection security, SQL injection prevention, and embedded replica security patterns.","2026-02-02","10 min read",{"path":39,"title":40,"description":41,"date":36,"readTime":26},"/blog/guides/upstash","Upstash Security Guide for Vibe Coders","Secure your Upstash Redis and Kafka when vibe coding. Learn token management, data encryption, rate limiting patterns, and secure caching strategies.",{"path":43,"title":44,"description":45,"date":46,"readTime":9},"/blog/guides/shadcn","shadcn/ui Security Guide for Vibe Coders","Secure your shadcn/ui components when vibe coding. Learn XSS prevention, form validation, accessible security patterns, and safe component customization.","2026-01-30",{"path":48,"title":49,"description":50,"date":46,"readTime":51},"/blog/guides/supabase","Supabase Security Guide: Row Level Security and Best Practices","Complete security guide for Supabase. Master Row Level Security (RLS), protect your API keys, and secure your database for production.","12 min read",{"path":53,"title":54,"description":55,"date":46,"readTime":51},"/blog/guides/trpc","tRPC Security Guide for Vibe Coders","Secure your tRPC API when vibe coding. Learn input validation with Zod, authentication middleware, rate limiting, and common security patterns for type-safe APIs.",{"path":57,"title":58,"description":59,"date":46,"readTime":37},"/blog/guides/vercel","Vercel Security Guide: Environment Variables and Edge Functions","Complete security guide for Vercel deployments. Learn to protect environment variables, secure serverless functions, and configure security headers for production.",{"path":61,"title":62,"description":63,"date":64,"readTime":31},"/blog/guides/softr","Softr Security Guide: Airtable App Protection","Security guide for Softr users. Learn about Airtable data security, user authentication, and protecting your Softr applications from common vulnerabilities.","2026-01-29",{"path":66,"title":67,"description":68,"date":64,"readTime":69},"/blog/guides/tabnine","Tabnine Security Guide: Privacy-Focused AI Coding","Security and privacy guide for Tabnine users. Learn about Tabnine's privacy options, code protection, and secure AI-assisted development practices.","7 min read",{"path":71,"title":72,"description":73,"date":64,"readTime":9},"/blog/guides/v0","v0 Security Guide: Securing AI-Generated React Components","Complete security guide for v0 by Vercel. Learn to secure AI-generated React and Next.js components before deploying to production.",{"path":75,"title":76,"description":77,"date":78,"readTime":9},"/blog/guides/render","Render Security Guide: Deploying Secure Web Services","Complete security guide for Render deployments. Learn to protect environment variables, configure private services, and secure your web applications.","2026-01-28",{"path":80,"title":81,"description":82,"date":78,"readTime":9},"/blog/guides/resend","Resend Email Security Guide for Vibe Coders","Secure your Resend email integration when vibe coding. Learn API key management, email injection prevention, rate limiting, and template security patterns.",{"path":84,"title":85,"description":86,"date":78,"readTime":9},"/blog/guides/retool","Retool Security Guide: Internal Tool Protection","Security guide for Retool users. Learn about permission systems, database connection security, and protecting internal tools built with Retool.",{"path":88,"title":89,"description":90,"date":78,"readTime":37},"/blog/guides/sanity","Sanity CMS Security Guide for Vibe Coders","Secure your Sanity CMS when vibe coding. Learn API token management, GROQ injection prevention, webhook security, and content access control patterns.",{"path":92,"title":93,"description":94,"date":78,"readTime":95},"/blog/guides/stripe","Stripe Security Guide for Vibe Coders","Secure your Stripe integration when vibe coding. Learn webhook verification, API key protection, PCI compliance basics, and common payment security mistakes.","13 min read",{"path":97,"title":98,"description":99,"date":100,"readTime":101},"/blog/guides/planetscale","PlanetScale Security Guide for Vibe Coders","Secure your PlanetScale serverless MySQL database when vibe coding. Learn connection string security, branch workflows, row-level security, and schema migration safety.","2026-01-27",null,{"path":103,"title":104,"description":105,"date":100,"readTime":37},"/blog/guides/postgresql","PostgreSQL Security Guide: Database Protection Basics","Security guide for PostgreSQL users. Learn about authentication, role-based access, encryption, and secure configuration for your Postgres database.",{"path":107,"title":108,"description":109,"date":100,"readTime":37},"/blog/guides/prisma","Prisma Security Guide: Safe Database Access in TypeScript","Complete security guide for Prisma ORM. Learn to prevent injection attacks, protect connection strings, and implement secure database patterns.",{"path":111,"title":112,"description":113,"date":100,"readTime":37},"/blog/guides/replit","Replit Security Guide: Securing Your Cloud-Based Projects","Complete security guide for Replit. Learn to protect secrets, secure deployments, and avoid common security mistakes in Replit projects.",{"path":115,"title":116,"description":117,"date":118,"readTime":101},"/blog/guides/openai","OpenAI API Security Guide for Vibe Coders","Secure your OpenAI API integration when vibe coding. Learn API key management, prompt injection prevention, cost controls, and safe output handling.","2026-01-26",{"path":120,"title":121,"description":122,"date":118,"readTime":26},"/blog/guides/railway","Railway Security Guide: Deploying Secure Backend Services","Complete security guide for Railway deployments. Learn to protect environment variables, secure databases, and configure private networking.",{"path":124,"title":125,"description":126,"date":127,"readTime":21},"/blog/guides/framer","Framer Security Guide: Design-to-Code Protection","Security guide for Framer users. Learn about site security, custom code safety, and protecting your Framer websites from common vulnerabilities.","2026-01-23",{"path":129,"title":130,"description":131,"date":127,"readTime":101},"/blog/guides/neon","Neon Postgres Security Guide for Vibe Coders","Secure your Neon serverless Postgres database when vibe coding. Learn connection pooling security, branching workflows, Row Level Security, and role management.",{"path":133,"title":134,"description":135,"date":127,"readTime":101},"/blog/guides/nextauth","NextAuth.js Security Guide for Vibe Coders","Secure your NextAuth.js authentication when vibe coding. Learn session security, callback protection, CSRF prevention, and common configuration mistakes to avoid.",{"path":137,"title":138,"description":139,"date":140,"readTime":101},"/blog/guides/fly-io","Fly.io Security Guide for Vibe Coders","Learn how to secure your Fly.io deployments when vibe coding. Cover secrets management, private networking, machine security, and deployment best practices.","2026-01-22",{"path":142,"title":143,"description":144,"date":140,"readTime":51},"/blog/guides/lovable","Lovable Security Guide: Securing Your GPT Engineer App","Built an app with Lovable (GPT Engineer)? Here's what to check for security. Common vulnerabilities and step-by-step fixes for your vibe-coded app.",{"path":146,"title":147,"description":148,"date":140,"readTime":37},"/blog/guides/mongodb","MongoDB Security Guide: Atlas Configuration and Best Practices","Complete security guide for MongoDB Atlas. Learn to configure network access, enable authentication, encrypt data, and secure your NoSQL database.",{"path":150,"title":151,"description":152,"date":140,"readTime":26},"/blog/guides/netlify","Netlify Security Guide: Functions, Environment Variables, and Forms","Complete security guide for Netlify. Learn to protect environment variables, secure serverless functions, handle forms safely, and configure security headers.",{"path":154,"title":155,"description":156,"date":157,"readTime":101},"/blog/guides/deno-deploy","Deno Deploy Security Guide for Vibe Coders","Secure your Deno Deploy applications when vibe coding. Learn environment secrets, permission handling, KV security, and edge function best practices.","2026-01-21",{"path":159,"title":160,"description":161,"date":157,"readTime":101},"/blog/guides/drizzle","Drizzle ORM Security Guide for Vibe Coders","Secure your Drizzle ORM queries when vibe coding. Learn SQL injection prevention, prepared statements, input validation, and safe raw query patterns.",{"path":163,"title":164,"description":165,"date":157,"readTime":51},"/blog/guides/firebase","Firebase Security Guide: Firestore Rules and Authentication","Complete security guide for Firebase. Master Firestore security rules, secure authentication flows, and protect your Firebase project from common vulnerabilities.",{"path":167,"title":168,"description":169,"date":170,"readTime":101},"/blog/guides/cloudflare-workers","Cloudflare Workers Security Guide for Vibe Coders","Secure your Cloudflare Workers when vibe coding. Learn secrets management, environment bindings, request validation, and edge security best practices.","2026-01-20",{"path":172,"title":173,"description":174,"date":170,"readTime":37},"/blog/guides/cursor-security-guide","Cursor Security: What Every Vibe Coder Needs to Know","Built an app with Cursor? Here's what to check for security. Common vulnerabilities in Cursor-generated code and how to fix them.",{"path":176,"title":177,"description":178,"date":179,"readTime":9},"/blog/guides/claude-code","Claude Code Security Guide: Protecting AI-Generated Projects","Security guide for Claude Code users. Learn how to review AI-generated code, protect secrets, and deploy secure applications built with Claude's coding assistant.","2026-01-19",{"path":181,"title":182,"description":183,"date":179,"readTime":184},"/blog/guides/clerk","Clerk Security Guide: Authentication Done Right","Complete security guide for Clerk authentication. Learn to properly integrate Clerk, protect routes, verify sessions, and avoid common authentication mistakes.","11 min read",{"path":186,"title":187,"description":188,"date":179,"readTime":9},"/blog/guides/codewhisperer","Amazon CodeWhisperer Security Guide: AWS AI Coding","Security guide for Amazon CodeWhisperer users. Learn about AWS integration, security scanning features, and secure development with AWS's AI coding assistant.",{"path":190,"title":191,"description":192,"date":179,"readTime":69},"/blog/guides/cody","Sourcegraph Cody Security Guide: Enterprise AI Coding","Security guide for Sourcegraph Cody users. Learn about enterprise code search, AI assistance security, and protecting proprietary code with Cody.",{"path":194,"title":195,"description":196,"date":179,"readTime":101},"/blog/guides/convex","Convex Security Guide for Vibe Coders","Secure your Convex backend when vibe coding. Learn argument validation, authentication patterns, authorization rules, and best practices for the reactive database platform.",{"path":198,"title":199,"description":200,"date":179,"readTime":26},"/blog/guides/copilot","GitHub Copilot Security Guide: Safe AI-Assisted Coding","Security guide for GitHub Copilot users. Learn to review suggestions, protect secrets with .copilotignore, and build secure applications with AI assistance.",{"path":202,"title":203,"description":204,"date":205,"readTime":9},"/blog/guides/bubble","Bubble Security Guide: No-Code App Protection","Security guide for Bubble.io users. Learn about privacy rules, API security, and protecting your no-code application from common vulnerabilities.","2026-01-16",{"path":207,"title":208,"description":209,"date":205,"readTime":26},"/blog/guides/cloudflare-pages","Cloudflare Pages Security Guide: Edge Deployment Best Practices","Complete security guide for Cloudflare Pages. Learn to configure environment variables, secure Workers functions, and use Cloudflare's security features.",{"path":211,"title":212,"description":213,"date":205,"readTime":37},"/blog/guides/cursor","Cursor Security Guide: Securing AI-Assisted Code","Complete security guide for Cursor AI editor. Learn to review AI-generated code, protect secrets, and deploy secure applications built with Cursor.",{"path":215,"title":216,"description":217,"date":218,"readTime":26},"/blog/guides/bolt-new-security-guide","Bolt.new Security Best Practices","Security guide for Bolt.new apps. Learn how to secure your Bolt-generated app, especially Supabase database connections, authentication, and deployment.","2026-01-15",{"path":220,"title":221,"description":222,"date":223,"readTime":31},"/blog/guides/aider","Aider Security Guide: Terminal AI Pair Programming","Security guide for Aider CLI users. Learn about API key protection, code review practices, and secure development with this terminal-based AI coding assistant.","2026-01-14",{"path":225,"title":226,"description":227,"date":223,"readTime":228},"/blog/guides/auth0","Auth0 Security Guide for Vibe Coders","Secure your Auth0 authentication when vibe coding. Learn token validation, RBAC configuration, secure callback handling, and common misconfigurations to avoid.","14 min read",{"path":230,"title":231,"description":232,"date":223,"readTime":228},"/blog/guides/aws-amplify","AWS Amplify Security Guide: Securing Your Full-Stack App","Complete security guide for AWS Amplify apps. Learn to secure authentication, APIs, storage, and hosting for your vibe-coded application.",{"path":234,"title":235,"description":236,"date":223,"readTime":184},"/blog/guides/bolt","Bolt.new Security Guide: Protecting Full-Stack AI Apps","Complete security guide for Bolt.new. Learn to secure AI-generated full-stack applications, protect database credentials, and deploy safely.",1775843918546]