supabase-extract-db-string

Community

Detect exposed DB connection strings.

Authormarvinbiss
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill identifies and alerts on accidentally exposed PostgreSQL database connection strings within client-side code, which is a critical security vulnerability.

Core Features & Use Cases

  • Vulnerability Detection: Scans client-side code for patterns matching Supabase or generic PostgreSQL connection strings, including passwords.
  • Critical Alerting: Immediately flags exposed credentials as a P0 (Critical) finding, providing detailed impact and remediation steps.
  • Use Case: During a security audit, this skill automatically scans the application's JavaScript bundles to ensure no database credentials are inadvertently leaked to the client, preventing direct database access by attackers.

Quick Start

Scan the application at https://myapp.example.com for any exposed database connection strings.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: supabase-extract-db-string
Download link: https://github.com/marvinbiss/servicesartisans/archive/main.zip#supabase-extract-db-string

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.