Start Free Scan
Security for AI-built apps

You shipped fast.
An attacker will be faster.

RedSight scans your app the way an attacker would. Exposed databases. Leaked keys. Injectable endpoints. With proof.

Free. No credit card. Results in 5 minutes.
RedSight Dashboard
17 scanners
12 intelligence engines
0 external dependencies
Works with any stack
Optimized for AI-built apps
Product preview

See the dashboard in action

Click through the interface. Expand findings. Toggle data masking. This is the real product.

RedSight
Findings
Scan Pipeline
🔒 Data Exposure
Settings
redsight / findings 4 critical
FindingEndpointSeverity
Exposed Supabase Service Role Key /bundle.js Critical
06-bundle-secrets
CWE-798
Confirmed
SUPABASE_KEY = "eyJhbG..."
SQL Injection — Time-Based Blind /api/products Critical
05-injection
CWE-89
5.02s response
WAITFOR DELAY '0:0:5'
Firebase Rules Allow Public Write /.json High
07-baas-exploit
CWE-284
PUT /.json → 200 OK
JWT Signed with Weak Secret /api/auth High
04-auth-attack
"secret123"
0.3s
Missing Content-Security-Policy / Medium
CORS Allows Any Origin /api/data Medium
SSL Certificate Expires in 12 Days :443 Low
redsight / scan pipeline Completed
01
Recon
02
Headers
03
Injection
04
Auth
05
Bundles
06
BaaS
07
SSL/TLS

01-recon — Fingerprinting, subdomain discovery, admin panel detection. Found: Supabase, React, Vercel deployment.

redsight / stolen data Breach detected
FieldValueStatus
Email s••••.m•••••••@c••••••.com masked
SSN •••-••-7735 masked
Card ••••-••••-••••-8834 masked
Name S•••• M•••••• masked
Salary $•••,••• masked
DOB ••/••/1987 masked
6 of 6 fields masked Click to toggle
Want to see a full scan result? View sample security report →
Scan results with critical findings
Finding detail zoom
What we find

Real vulnerabilities.
Real proof.

Not a checklist of best practices. Every finding includes the exact endpoint, the evidence we extracted, and how to fix it.

Critical

Exposed Supabase Service Role Key

Service role key found in client-side JS bundle. Bypasses all RLS policies.

Critical

SQL Injection — Time-Based Blind

Sort parameter accepts arbitrary SQL. 5-second delay confirms execution.

High

Firebase Database Rules Allow Public Write

Unauthenticated users can write to the root path. All app data is exposed.

Medium

CORS Allows Any Origin

API responds with Access-Control-Allow-Origin: * combined with credentials.

How it works

Paste your URL. Get proof.

No agents to install. No config files. Just a URL and 5 minutes.

1

Enter your target

Paste the URL of your app. Works with any stack — Lovable, Base44, Bolt, v0, or custom builds on Supabase, Firebase, and beyond.

Quick scan in 2 min. Deep scan in 5. No setup required.
Dashboard
2

17 scanners run in parallel

Reconnaissance, injection testing, bundle analysis, BaaS exploitation, auth attacks, SSL checks — everything runs simultaneously.

Watch progress live. Each scanner reports findings as it goes.
Scan in progress
3

Get actionable results

Every finding comes with the exact endpoint, evidence, severity score, and remediation steps. No false positives — we prove it or we don't report it.

Connect GitHub for automated fix PRs. Export reports for compliance.
Detailed finding
Attack chain

This is how your app gets breached

AI code generators skip security steps. Attackers know this. Here's the chain we find — and break.

Step 1
Reconnaissance
Attacker fingerprints your stack. Discovers Supabase, Next.js, exposed admin panels.
$ recon target.example.com
→ Supabase, React, Vercel
Step 2
Key extraction
Scans JS bundles for API keys, service role tokens, database connection strings.
bundle.js → SUPABASE_KEY
→ service_role (full access)
Step 3
Auth bypass
Uses leaked key to bypass RLS. Directly queries database. No auth needed.
SELECT * FROM users
→ 2,841 rows returned
Breach
Data exfiltration
Emails, passwords, payment records — all extracted. Your users are compromised.
Emails: 2,841
Passwords: 2,841
Payment records: 612
Why RedSight

Not another checklist scanner

Most scanners check headers and call it done. RedSight actually attacks your app — safely — and shows you the proof.

🔍

Proof, not guesses

Every finding includes the exact request, response, and evidence. If we report SQL injection, we show the extracted data.

Built for AI apps

Specialized scanners for Supabase, Firebase, Lovable, Base44, Bolt, and v0. We know where AI generators cut corners.

🛡

Zero-config

No agents, no SDKs, no YAML files. Paste your URL and get results in 5 minutes. Works from the outside, like a real attacker.

📊

Severity scoring

Every scan gets a 0-100 security score with letter grade. Track improvement over time as you fix issues.

🔧

GitHub auto-fix

Connect your repo and get pull requests with fixes generated automatically. Review and merge — done.

🔒

Breach detection

We don't just find vulnerabilities. We check if data has already been extracted through the holes we discover.

0
Security scanners
0
Intelligence engines
0
Vulnerability types
0
Min to first result
Pricing

Scan free. Pay when it matters.

Every scan runs all 17 scanners. You only pay to see the full details.

Full Security Audit
$39
One-time payment · No subscription · One domain
Full vulnerability details & evidence Step-by-step remediation plan Downloadable HTML report Attack chain analysis
Unlock Your Full Audit
A manual pentest costs $2,000+. Same ground, 5 minutes, fraction of the price.
Best for: founders launching, AI-built apps, pre-release checks
Free scan → grades & titles | $39 audit → full details, fixes & report
Scan regularly? Subscribe & save
Agency
$99/mo
Best for agencies & client work
  • Everything in Pro
  • 50 verified domains
  • 500 scans/day
  • Unlimited scan history
  • Dedicated email support
Get Agency
Enterprise — $249/mo
Unlimited domains & scans. Dedicated support. Best for teams managing multiple products.
Contact us →
Annual plans coming soon — save 20%. Get notified
FAQ

Common questions

Everything you need to know about RedSight.

How is RedSight different from other scanners?

RedSight is built specifically for AI-generated apps. We test for the exact patterns that Lovable, Bolt, v0, Base44, and similar platforms produce — like exposed Supabase keys, misconfigured Firebase rules, and missing auth middleware. Every finding includes actual evidence, not just theoretical risks.

Is it safe? Will it break my app?

Yes, completely safe. RedSight sends read-only HTTP requests — exactly what a browser does. We never write data, modify files, or run code on your server.

Do I need to verify domain ownership?

Yes. Before scanning, you verify ownership via DNS TXT record, a file upload, or an HTML meta tag. This prevents unauthorized scanning of sites you don't own.

What's included in the free scan?

Every free scan runs all 17 scanners and shows you a security grade, severity breakdown, and finding titles — so you know exactly what's wrong. But the details (exploit evidence, affected endpoints, remediation steps) are blurred. Unlock the full audit for $39 one-time, or subscribe to Pro ($49/mo) for unlimited audits and deep scans.

What do I get for $39?

A complete security audit report for one domain: every vulnerability explained with evidence, step-by-step remediation instructions, attack chain analysis, and a downloadable HTML report you can share with your team. No subscription — pay once, keep the report forever.

Do existing Solo subscribers keep their access?

Yes. If you subscribed to our previous Solo plan, your account is automatically mapped to Pro with the same (or better) limits. No action needed.

How long does a scan take?

Quick: ~2 minutes. Standard: ~5 minutes. Deep: up to 10 minutes. 17 scanners run in parallel for maximum coverage.

What tech stacks does it work with?

Any web application accessible via URL. We have specialized scanners for Supabase, Firebase, WordPress, Shopify, Drupal, and Joomla — but the core scanners work with any stack.

Find what attackers find.
Before they do.

Free scan. No credit card. No setup. Just paste your URL and see what's exposed.

Start Free Scan
Results in 5 minutes or less