AI App & Agent Risk Scanner

Find security risks in AI-built apps, agents, and automations before users do.

Scan projects built with Lovable, Replit, Bolt, Cursor, Claude Code, Supabase, n8n, Make, Zapier, and more.

No signup. No credit card. Just an email.

myagentrisk-scanner

$ scan ./my-lovable-app

app + agent signals evaluated

↳ missing_authentication: CRITICAL

↳ weak_supabase_rls: HIGH

↳ exposed_api_keys: HIGH

↳ prompt_injection: MEDIUM

↳ missing_human_approval: HIGH

score: 82 / 100 · level: CRITICAL

$ recommendation: Hold launch. Apply top-5 urgent fixes.

How it works

01

Describe your app or agent

What it is, what it does, what it touches. Takes about 60 seconds.

02

Get your free risk score

Deterministic scoring across app and agent risk signals. Top 3 risks and quick fixes shown immediately.

03

Unlock the full report

Severity per category, prompt-injection hardening, safer system-prompt rewrite, top-5 fixes, launch recommendation.

App risks

For Lovable, Replit, Bolt, Cursor & Supabase apps

The mistakes we keep finding in vibe-coded apps before they ship.

Missing authentication

Sensitive pages and APIs reachable without login.

Weak Supabase RLS

Row-level security disabled or written incorrectly.

Public database exposure

Anon role granted read or write on user tables.

Exposed API keys

Service-role / private keys shipped to the browser.

Insecure admin pages

Admin gated client-side only — APIs left open.

Missing payment webhook validation

Unverified webhooks flip 'paid' for free.

No rate limiting

Login, signup, and AI endpoints open to abuse.

Sensitive data leakage

Logs and error pages spill PII or tokens.

Agent risks

For AI agents and n8n / Make / Zapier workflows

Aligned with the OWASP Top 10 for LLM Applications.

Prompt injection

Hidden instructions in docs, web pages, or user input.

Tool abuse

Write, send, and external-trigger tools used unintendedly.

Excessive permissions

OAuth scopes far beyond the agent's task.

Missing human approval

High-impact actions execute autonomously.

Unsafe external actions

Webhooks and side-effects fired without validation.

RAG / document poisoning

Retrieved chunks or uploaded files hijack behavior.

Built by an engineer

Kelvin Medina — technical security lead

Application & cloud security background. Former Principal Security Consultant at Trustwave and former Sr Security Engineer at AWS. Dozens of assessments shipped across industries — that experience is encoded in this scanner.

Read bio

Stop guessing. Score your app or agent.

Free, deterministic, and ready in less than a minute.