Secret exposure
Find API keys, tokens, private keys, database URLs, webhook secrets, and test credentials before they leave your repo.
VibeScan checks Cursor, Bolt, Lovable, and v0 projects for leaked secrets, broken auth, injection paths, and risky data exposure before you share a repo or deploy.
60s
target scan time
14+
risk families
0 CLI
setup required
Coverage
Most generated code looks reasonable at a glance. VibeScan focuses on the parts that tend to be dangerous when speed beats scrutiny: credentials, route ownership, data boundaries, and user-controlled input.
Find API keys, tokens, private keys, database URLs, webhook secrets, and test credentials before they leave your repo.
Spot missing route guards, admin-only actions exposed to users, and endpoints that trust client-side identity.
Trace risky interpolation through SQL, NoSQL, shell commands, redirects, SSRF calls, and prompt payloads.
Catch responses that send raw customer data, internal errors, environment values, or over-broad object fields.
Compare assistant-generated changes against the previous version and flag newly introduced security drift.
Run VibeScan in CI and block merges when a generated change introduces a critical or high-severity finding.
Workflow
Keep the speed of AI-assisted building, then run the checks that are easy to miss when the feature appears to work.
VibeScan builds a temporary project map, ignores dependency noise, and focuses on the files you actually own.
The scanner follows routes, handlers, model access, and environment usage instead of reporting generic lint noise.
Every issue gets a severity, file path, reason, and practical next action so you can fix the dangerous parts first.
Why it matters
AI coding tools optimize for getting the feature over the line. They do not know your threat model, your customer data boundaries, or the route-level rules that make a feature safe in production.
VibeScan is the security pass after the build pass. It gives you a focused report before a demo, client handoff, public repository share, or deploy.
7/10
test apps exposed a credential
9/10
had at least one auth gap
4/10
contained injection risk
Sample report
Launch track
Public GitHub repository scans
Patch suggestions with before and after diffs
Shareable client-ready security reports
GitHub Action checks for every pull request
Early access