supabase-extract-db-string
CommunityDetect exposed DB connection strings.
Authormarvinbiss
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill identifies and alerts on accidentally exposed PostgreSQL database connection strings within client-side code, which is a critical security vulnerability.
Core Features & Use Cases
- Vulnerability Detection: Scans client-side code for patterns matching Supabase or generic PostgreSQL connection strings, including passwords.
- Critical Alerting: Immediately flags exposed credentials as a P0 (Critical) finding, providing detailed impact and remediation steps.
- Use Case: During a security audit, this skill automatically scans the application's JavaScript bundles to ensure no database credentials are inadvertently leaked to the client, preventing direct database access by attackers.
Quick Start
Scan the application at https://myapp.example.com for any exposed database connection strings.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: supabase-extract-db-string Download link: https://github.com/marvinbiss/servicesartisans/archive/main.zip#supabase-extract-db-string Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.