Burak Eregar Profile picture
indie dev • building in public • travelling the world ☠️ https://t.co/FDsz1A1dwW - secure your vibecoded app 💎 https://t.co/Lzh71PmHdb 👨‍💻 https://t.co/jZsVBIJZc1 🎮 https://t.co/edFPZ7ncwI
Jan 25 6 tweets 2 min read
most people will install clawd and accidentally hand it their entire life

it’s incredible: a 24/7 ai agent on your server that controls your github, calendar, and email via whatsapp/telegram

but stop and think for a second

you just gave an ai autonomous execution rights on your machine and root access to your digital life

if you run this with default settings, you are one prompt injection away from wiping your entire github organization, losing your emails or much worse

before you connect it to anything, you need to lock it down to make sure you and your digital life are secure

here is the non-negotiable security config for clawd: 👇 1. turn on the sandbox

by default, agents might run commands directly on your os.

go to and enable isolation. do not skip this.docs.clawd.bot/gateway/sandbo…
Jan 21 5 tweets 3 min read
senior engineers are busy mocking vibe coders for "bad code."

meanwhile, vibe coders are shipping products and making money

yes, the code is messy. yes, the security is often non-existent

but that is fixable

instead of gatekeeping, i decided to help them to secure

the response proved that vibe coders care about safety:

• 2M+ impressions on my security posts
• 2,500+ visits on audityour.app
• $1,000+ revenue in 72 hours

we are building fast, but now we are building safe

here are 3 rules you need to copy into your .cursorrules immediately so your AI stops writing vulnerable code 👇 1) stop your AI from leaking user data in logs

ai agents love debugging with console.log(userObject)

this means your server logs (which many services expose) will contain cleartext passwords, emails, and session tokens.

copy this to .cursorrules:

# SECURITY - LOGGING
- NEVER use console.log() on entire objects (e.g., `user`, `req`, `res`).
- ONLY log specific IDs or status messages.
- STRIP all PII (email, phone, ip) before logging.
Jan 20 11 tweets 2 min read
👨‍💻 vibe coders' security handbook:

here is the top 10 most critical security risks in 2026

as a vibe coder, you don't know what you don't know

so i made you a list that you can simply add as a rules/skills file or use them in your prompts to secure your app

here we go👇 1) broken access control

users can access data or functions they shouldn't, like viewing someone else's account. enforce checks on every request, use centralised authorisation, and deny by default
Jan 19 4 tweets 1 min read
🏴‍☠️this is how your vibecoded app gets hacked...

let's hack a website together

i'll show you why "trusting client" fallacy can cost you 1000s of dollars

thread to learn how to avoid this: rule #1: treat every client as hostile

never trust roles, prices, user ids, flags, or limits coming from the frontend. the client only requests. the server decides.
Jan 15 8 tweets 2 min read
☠️ here is why your vibe coded project is not safe

when you set db rules, you think you are safe ☣️

watch how i exploit a "safe" supabase db by inserting millions of rows

see the thread below to learn how to protect yours

(don't just bookmark it, add them to the rules file) RLS rules are go to approach by AI models...

but they shouldn't be. you must do these instead:

1) enable RLS but don't put any rules this will close your database to the outside of the world. after this only service role key can reach your db
Jan 14 4 tweets 1 min read
☠️ stop what you are doing and audit your database functions immediately

today i gave myself $10,000 worth of free AI credits across 3 different "vibe coded" apps

if you are not protecting yourself, bad actors will abuse this

here is how i did and how to fix it 👇 because many vibe coders (and the ai agents they use) don't realise that PostgreSQL database functions are PUBLIC executable by default

if you create a function in supabase to handle internal logic, and you don't explicitly lock it down, anyone with your anon key (which is public!) can execute it.

this is a massive blindspot in the "build fast" mentality.
Jan 13 14 tweets 3 min read
✍️ over 80% of the vibe coded apps have critical security vulnerabilities

here is the checklist to make sure your app doesn't have this:

(don't jut bookmark this, copy them into your .cursorrules file) don't talk to the database directly

if you use tools like supabase or firebase, the ai often connects your frontend straight to the database. this is like leaving your front door open. instead, ask the ai to build a "middleware" or backend api that handles the data for you.