Supabase Audit Rls
Helps with Supabase, auditing as part of working with databases and data persistence workflows.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add supabase-audit-rls npx -- -y @trustedskills/supabase-audit-rls
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"supabase-audit-rls": {
"command": "npx",
"args": [
"-y",
"@trustedskills/supabase-audit-rls"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to audit Row Level Security (RLS) policies within Supabase databases, ensuring data access rules are correctly configured. It helps identify potential security vulnerabilities or misconfigurations that could expose sensitive information to unauthorized users.
When to use it
- Before deploying a new Supabase project to production to validate initial security settings.
- During routine maintenance to verify that RLS policies still align with updated business logic.
- When investigating suspected data leaks to check if policy gaps allowed unauthorized access.
- As part of a penetration testing workflow to simulate and detect privilege escalation attempts.
Key capabilities
- Analyzes existing Row Level Security policies for logical errors or overly permissive rules.
- Identifies missing policies that should restrict access to specific data rows based on user roles.
- Evaluates policy definitions against best practices for Supabase security architecture.
Example prompts
- "Audit the RLS policies in my Supabase project and list any rules that allow public read access to private tables."
- "Check if my current Row Level Security configuration properly restricts users from viewing other users' records."
- "Review the database schema and suggest missing RLS policies needed to enforce role-based data isolation."
Tips & gotchas
Ensure you have appropriate read permissions on the Supabase project before running an audit, as the agent needs access to policy definitions. This skill focuses on logical analysis of rules rather than executing database commands directly.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.