indie dev • building in public • travelling the world
☠️ https://t.co/FDsz1A1dwW - secure your vibecoded app
💎 https://t.co/Lzh71PmHdb
👨💻 https://t.co/jZsVBIJZc1
🎮 https://t.co/edFPZ7ncwI
Jan 25 • 6 tweets • 2 min read
most people will install clawd and accidentally hand it their entire life
it’s incredible: a 24/7 ai agent on your server that controls your github, calendar, and email via whatsapp/telegram
but stop and think for a second
you just gave an ai autonomous execution rights on your machine and root access to your digital life
if you run this with default settings, you are one prompt injection away from wiping your entire github organization, losing your emails or much worse
before you connect it to anything, you need to lock it down to make sure you and your digital life are secure
here is the non-negotiable security config for clawd: 👇
1. turn on the sandbox
by default, agents might run commands directly on your os.
senior engineers are busy mocking vibe coders for "bad code."
meanwhile, vibe coders are shipping products and making money
yes, the code is messy. yes, the security is often non-existent
but that is fixable
instead of gatekeeping, i decided to help them to secure
the response proved that vibe coders care about safety:
• 2M+ impressions on my security posts
• 2,500+ visits on audityour.app
• $1,000+ revenue in 72 hours
we are building fast, but now we are building safe
here are 3 rules you need to copy into your .cursorrules immediately so your AI stops writing vulnerable code 👇
1) stop your AI from leaking user data in logs
ai agents love debugging with console.log(userObject)
this means your server logs (which many services expose) will contain cleartext passwords, emails, and session tokens.
copy this to .cursorrules:
# SECURITY - LOGGING
- NEVER use console.log() on entire objects (e.g., `user`, `req`, `res`).
- ONLY log specific IDs or status messages.
- STRIP all PII (email, phone, ip) before logging.
Jan 20 • 11 tweets • 2 min read
👨💻 vibe coders' security handbook:
here is the top 10 most critical security risks in 2026
as a vibe coder, you don't know what you don't know
so i made you a list that you can simply add as a rules/skills file or use them in your prompts to secure your app
here we go👇
1) broken access control
users can access data or functions they shouldn't, like viewing someone else's account. enforce checks on every request, use centralised authorisation, and deny by default
Jan 19 • 4 tweets • 1 min read
🏴☠️this is how your vibecoded app gets hacked...
let's hack a website together
i'll show you why "trusting client" fallacy can cost you 1000s of dollars
thread to learn how to avoid this:
rule #1: treat every client as hostile
never trust roles, prices, user ids, flags, or limits coming from the frontend. the client only requests. the server decides.
Jan 15 • 8 tweets • 2 min read
☠️ here is why your vibe coded project is not safe
when you set db rules, you think you are safe ☣️
watch how i exploit a "safe" supabase db by inserting millions of rows
see the thread below to learn how to protect yours
(don't just bookmark it, add them to the rules file)
RLS rules are go to approach by AI models...
but they shouldn't be. you must do these instead:
1) enable RLS but don't put any rules this will close your database to the outside of the world. after this only service role key can reach your db
Jan 14 • 4 tweets • 1 min read
☠️ stop what you are doing and audit your database functions immediately
today i gave myself $10,000 worth of free AI credits across 3 different "vibe coded" apps
if you are not protecting yourself, bad actors will abuse this
here is how i did and how to fix it 👇
because many vibe coders (and the ai agents they use) don't realise that PostgreSQL database functions are PUBLIC executable by default
if you create a function in supabase to handle internal logic, and you don't explicitly lock it down, anyone with your anon key (which is public!) can execute it.
this is a massive blindspot in the "build fast" mentality.
Jan 13 • 14 tweets • 3 min read
✍️ over 80% of the vibe coded apps have critical security vulnerabilities
here is the checklist to make sure your app doesn't have this:
(don't jut bookmark this, copy them into your .cursorrules file)
don't talk to the database directly
if you use tools like supabase or firebase, the ai often connects your frontend straight to the database. this is like leaving your front door open. instead, ask the ai to build a "middleware" or backend api that handles the data for you.