Moltbook
1.5M API keys leaked, three days post-launch. AI built tables without RLS; the anon key was a master key.
Post-mortem2026's pattern is clear: an AI agent eventually does something to your Supabase project you didn't intend. Suparbase is the layer that catches the RLS drift in 30 seconds and lets you undo the bad session with one button.
Every other week a vibe-coded Supabase project gets destroyed in public. The cause is almost always one of two things: RLS was wrong, or an AI agent ran one too many commands.
1.5M API keys leaked, three days post-launch. AI built tables without RLS; the anon key was a master key.
Post-mortem170 of 1,764 scanned apps had inverted RLS: 'if you're logged in, you can read every row'. 80% of vibe-coded apps share that mistake.
Scan write-upCursor's Claude Opus agent deleted the production database AND every backup in 9 seconds. No way to undo.
Tom's HardwareSentry probes every public table with the actual anon key every time you scan. If RLS gets disabled or a permissive policy slips through, you know in 30 seconds, not next Tuesday in a Supabase email.
When a critical finding lands, apply a temporary deny-all RLS policy with one button. The bleeding stops. The Lift button drops the policy when you've fixed the root cause.
Every write that goes through Suparbase's proxy is fingerprinted by User-Agent: Cursor, Claude Code, Replit Agent, Lovable, v0, the Vercel AI SDK, your own MCP server. Sessions group writes from the same agent within a 5-minute window.
When an agent does the unthinkable, click Undo. Every INSERT, UPDATE, and DELETE in the session is reversed in a single Postgres transaction. PocketOS would have had a button. You do.
Suparbase started as the workspace you actually want next to your AI editor. The Sentry layer sits on top.
Persistent conversations per project. The agent lists tables, inspects columns, runs filtered reads, drafts writes you confirm in a diff card. Tools include aggregate, list_indexes, audit_summary.
Read-only by default. Statement timeout. EXPLAIN. Recent dropdown. The agent's writes appear here as proposals before they apply.
Paste a JWT claim set, pick a verb, run the query. Allow / deny per policy, all inside a transaction that rolls back. Find the bug before production does.
Paste the project URL + an anon key on the new-connection page. Optionally add the Direct Postgres URL on the same screen, this unlocks Sentry's pg_policies inspection and one-click session undo.
Baseline your exposure today. Sentry will list any anon-readable tables, missing-or-permissive RLS policies, and any PII-shaped columns currently exposed.
Cursor, Claude Code, Replit Agent, Lovable, v0, Vercel AI SDK: pick your tool. Suparbase identifies each one from the User-Agent on every authenticated write and groups their mutations into sessions.
Suparbase walks the audit log for that session in reverse and reverts every INSERT / UPDATE / DELETE in a single transaction. Either it all reverses or nothing changes.
Free tier for solo projects. Five minutes to set up. The seat-belt your AI agent doesn't have.