Skip to main content
Security

Security is essential.
Are you secure?

Coding and testing belong together – just like attack and defense. When coding takes the next step, testing has to take the next step. When attackers step up, defense has to step up. Coding is being automated. So we automate testing.

The way we test

Websites come to life in the user's browser – not on the server. The server only delivers the building blocks. How a page actually looks, behaves and performs is determined in the browser. Anyone testing only on the server is checking the plan, not the result. Whether a page truly works becomes visible on the screen where it appears. That's where we look.

What we check

Comprehensive checks for the most common security vulnerabilities.

Tech Stack Detection

Frameworks, BaaS, hosting & libraries automatically identified.

Open Databases & APIs

Supabase RLS, Firebase Rules and open endpoints checked.

Exposed Secrets

API keys, .env files and source maps uncovered.

Security Headers & CORS

HSTS, CSP, X-Frame-Options and CORS configuration.

Misconfigurations

Common security mistakes in modern deployments.

Public Admin Endpoints

Dashboard URLs and admin panels without protection detected.

Layer 1 – Tech Stack Detection

"What technologies are being used?" Analysis of the deployed stack with focus on security-relevant features.

Detection Methods

HTTP Response HeadersServer, Framework, CDN · server: cloudflare
HTML & Script TagsFrontend framework, Tracking · /_next/... → Next.js
JS Bundle AnalysisLibraries + Versions, Keys · react@18.2.0
API Endpoint FingerprintingBaaS provider · *.supabase.co
DNS/TLS AnalysisHosting, CDN · Vercel, Netlify
Known PathsAdmin panels, Config · /wp-admin, /.env

Detected Categories

FrontendReact, Vue, Svelte, Angular, Next.js, Nuxt, Astro
BackendNode, PHP, Python, Ruby, Go
BaaSSupabase, Firebase, Appwrite, Convex, Nhost
CMSWordPress, Kirby, Strapi, Sanity, Contentful
HostingVercel, Netlify, Render, Railway, Fly.io, Cloudflare
AuthClerk, Auth0, Supabase Auth, Firebase Auth
PaymentsStripe, Paddle, LemonSqueezy
AnalyticsPlausible, PostHog, Google Analytics, Mixpanel
AI BuilderLovable, Bolt, v0, Replit

Example Output

{
  "builder":  { "name": "Lovable",   "confidence": 0.92 },
  "frontend": { "name": "React",     "version": "18.3.1", "latest": "19.1.0", "outdated": true },
  "baas":     { "name": "Supabase",  "project_ref": "zzwy...iqyt", "region": "eu-central-1" },
  "hosting":  { "name": "Vercel",    "confidence": 0.95 },
  "ui":       { "name": "shadcn/ui", "version": "0.8.0" }
}

Layer 2 – Version & Vulnerability Check

"Is it up to date?" – CVE matching via NVD, Snyk & GitHub Advisory DB.

Frontend library versionsHigh
Server softwareHigh
BaaS SDK versionMedium
TLS configurationMedium
Known vulnerable pathsCritical

Layer 3 – Configuration Audit

Our differentiator – we test what most scanners ignore.

Supabase-specific

RLS active?Critical
Checks if Row Level Security is active on all tables
Tables exposed?High
Number of publicly accessible tables via OpenAPI Schema
Write access open?Critical
POST with empty body tests if RLS is enforced
Sensitive tables?Critical
Pattern matching on users, admin, passwords, payments
Storage buckets public?High
Checks if storage buckets are accessible without auth

General Checks

CORS PolicyHigh
Tests with evil.com Origin
Security HeadersMedium
HSTS, CSP, X-Frame-Options
.env / .git exposed?Critical
Probing known paths
Source MapsMedium
*.js.map availability
Rate LimitingMedium
50 requests in 5 seconds burst
Cookie SecurityMedium
Secure, HttpOnly, SameSite flags
GDPR Quick CheckInfo
Legal notice, privacy policy, cookie banner

Layer 4 – Beyond Security

We don't just check security. Every scan also analyzes SEO, accessibility, legal compliance and sustainability.

SEO

Meta tags, headings, Open Graph, robots.txt, sitemap, canonical URLs, mobile-friendliness.

Accessibility

ARIA attributes, form labels, document language, heading hierarchy, image alt text, color contrast.

Legal & GDPR

Privacy policy, impressum, cookie consent, tracking without consent, third-party data transfers.

Sustainability

Page weight, HTTP compression, image optimization, request count, green hosting indicators.

Reporting, Assessment & Recommendations

Every scan produces a comprehensive report with a clear release readiness verdict and actionable recommendations.

Release Readiness

Instead of abstract scores, you get a plain-language assessment of whether your site is ready to go live – or what needs to happen first. Each finding comes with a risk explanation and step-by-step fix instructions.

Release Ready

No blocking issues found. Your site is ready to go live.

Continuous Testing

RGate helps you to stay safe. Re-scan after every deploy to catch regressions early and maintain a strong security posture over time.

Conditional – Action Required

New issues detected after deploy. Review recommended.

What we check

Security

50 automated checks

TLS / Certificate

Security Headers

CORS Configuration

Exposed Files & Paths

Supabase Configuration

Firebase Configuration

Known Vulnerabilities (CVE)

Security FAQ

Common questions about automated security testing.

    Website Security Scan – Automated in 60 Seconds | RGate