Your Lovable App Is Probably Exposed. Here's How to Check.

March 5, 2026
News/Press releases

Yesterday, security researcher Taimur Khan published findings that should worry every single person who's shipped a Lovable app.

16 vulnerabilities. 6 critical. 18,000+ users' personal data exposed. Including minors.

The platform's official response? "Security is the user's responsibility."

You trusted an AI platform to help you build something. The AI skipped basic security. And now the platform says that's your problem.

What Happened

A Lovable-hosted app with over 100,000 views was found wide open. The AI-generated code never turned on row-level security in Supabase. The authentication logic was backwards. It blocked real users and let attackers get full access to user records, send bulk emails, delete accounts, view sensitive PII, etc. Ugly.

This isn't theoretical and the same kind of vulnerability could be sitting in your project right now.

Check Your App. Right Now.

We'd been building RLS auditing tooling for Lovable projects as part of our product. We weren't ready to ship it. Doesn't matter. A breach this bad can’t wait.

So we carved-out a simple, no-sign-up, rough-around-the-edges tool and open-sourced it.

It's called
Vibe-Scanner Run it now.

https://github.com/SymbioticSec/vibe-scanner

Vibe-Scanner runs 62 detection rules against your project's Row Level Security (RLS) configuration and flags the exact class of vulnerabilities that caused this breach, including:

It works two ways: point it at your local SQL migration files, or connect it directly to your live Lovable database to see your actual deployed state — which catches even more. You can scan all your Lovable projects at once with a single command. Results are graded by severity: CRITICAL, HIGH, MEDIUM, LOW, and WARNING — so you know exactly what to fix first.

What it does not do

Vibe-Scanner is a read-only auditing tool. It detects and reports, but it does not modify your database, apply fixes, or patch your code.

If you find yourself vulnerable, we're temporarily giving free access to Symbiotic Code so you can remediate. Not a sales trick, just trying to be helpful without having to carve out a new tool from our product. Contact us.

The Bigger Problem Nobody's Talking About

By the way, this isn't just about Lovable. This is the canary in the coal mine for every AI coding tool.

AI-generated code is fast. It's also completely blind to security context. Unless something in the workflow actively enforces secure patterns, you get what happened here: code that looks fine on the surface and is completely exposed underneath.

The DORA report found a 7.2% decrease in delivery stability for every 25% increase in AI code usage. Nearly half of all AI-generated code contains vulnerabilities.

Telling developers to "review security before publishing" doesn't work when those developers chose AI tools because they're not security experts. That's the whole point.

You need security built into the generation process. Not bolted on after the damage is done.

What You Should Do Right Now

  1. Run the scanner. Check your Lovable projects immediately: https://github.com/SymbioticSec/vibe-scanner
  2. If you're exposed, reach out and we'll give you a free Symbiotic Code license to remediate.
  3. If you're not on Lovable but using AI to write code, ask yourself: what's your pre-commit security strategy?

Source: SC World - Lovable platform faces scrutiny over app vulnerabilities and data leak

About the author
Jerome Robert
CEO - Symbiotic
With over 20 years of experience in cybersecurity and 15 years as a CxO, Jérôme has a proven track record in driving successful outcomes. He has been instrumental in five successful exits, including Lexsi (acquired by Orange in 2016) and Alsid (acquired by Tenable in 2021)
Icon line
See all articles

Book a demo

See how our solution empowers teams to grow their security maturity and to code securely & efficiently.
Book a demo
Icon line
Demo illustration