supabase-security-mcp
Provides tools to audit Supabase projects for security vulnerabilities, preview and apply SQL fixes, and re-audit to verify fixes.
supabase-security-mcp
The only Supabase security tool that closes the loop in your AI agent. Audit, preview the fix, and apply it — without leaving Claude / Cursor / Cline.
You: audit my supabase project rkmrsefraqssuyuniyco
Claude: Found 17 critical leaks. Want me to apply all SQL fixes?
Run preview_fix on each first?
You: preview them all, then apply if safe.
Claude: [previews each]
All 17 fixes preview cleanly. Applying...
Done. Re-audited: 0 critical findings remaining.Other Supabase scanners (SupaExplorer, AuditYourApp, Vibe App Scanner) report. None of them remediate. This one does.
Tools
Tool | What it does |
| Scan a project. Returns JSON findings. Caches for follow-up tools. |
| List cached findings, optionally filter by severity. |
| Wrap the fix SQL in |
| Actually apply one finding's fix. Requires |
| Bulk-apply at or above a severity. Single transaction — all or nothing. |
Install
Claude Desktop / Claude Code
Add to your MCP config (~/.claude.json or claude_desktop_config.json):
{
"mcpServers": {
"supabase-security": {
"command": "npx",
"args": ["-y", "@perufitlife/supabase-security-mcp@latest"],
"env": {
"SUPABASE_ACCESS_TOKEN": "sbp_your_personal_access_token"
}
}
}
}Get a token at https://supabase.com/dashboard/account/tokens (read+write to your projects).
Cursor
Settings → MCP → Add new MCP server → paste the same JSON object as above.
Cline / Continue / etc.
Anything that supports MCP stdio servers will work — point it at npx -y @perufitlife/supabase-security-mcp@latest with the env var set.
Safety model
Never auto-applies. Every
apply_fixandapply_all_fixescall requiresconfirm: true.Preview before apply.
preview_fixruns the SQL insideBEGIN; ... ROLLBACK;so you see if it would error before touching state.All-or-nothing bulk apply.
apply_all_fixesruns everything in a single transaction. If any statement fails, the entire change rolls back.Re-audit after apply. Every
apply_fixre-runs the audit and reports whether the finding is actually gone — protects against fix-that-doesn't-fix.Read-only by default for
audit_project. Token can be a read-only PAT if you only want to scan, never remediate. (Forapply_fix, you need write access.)
What it scans
Inherits all checks from supabase-security-skill:
Tables with RLS disabled and direct anon grants
SECURITY DEFINERfunctions executable by anonPublic storage buckets
Default privileges still granting CRUD to anon
Auth signups with autoconfirm enabled
Defense-in-depth: RLS-locked tables with stale anon grants
Why MCP and not just a CLI
CLIs are great. They're not in your AI agent's context. When you're vibing with Claude in your IDE, asking "is my supabase tight?" should get an actual scan, not a "you should run this command on your laptop."
The flow this enables:
"Add a
subscriptionstable to my schema." → agent does it"Now scan for security issues." → agent calls
audit_projectAgent notices the new table has no RLS.
"Want to fix?" →
preview_fix, thenapply_fixafter you say yes.
That round-trip is the actual product. The audit is just step 2.
Roadmap
Cron job audit (
pg_cron)Edge function secrets scan
Storage object-level RLS scan
HTML report generation as a tool (returns base64 + filename)
CORS configuration check
License
MIT.
Maintenance
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Perufitlife/supabase-security-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server