Claude Code Skills

10 security audit skills for Claude Code. Generate read-only SQL queries to audit your Supabase project — nothing is executed automatically.

npx skills add nocodetalks/supabase-security-audit

How it works

1

Run a skill

Type a command like /audit-rls in Claude Code

2

Get SQL queries

Claude generates read-only SQL tailored to your situation

3

Review & fix

Paste in your SQL Editor, get results interpreted, and apply recommended fixes manually

Where to start

Recommended /full-security-audit

Full Security Audit

Comprehensive audit covering RLS, policies, sensitive columns, storage, functions, API exposure, auth, and Realtime in a single script. Start here for a complete picture.

13 checks in one script
1. Tables without RLS
2. RLS enabled but no policies
3. Permissive write policies
4. Sensitive column exposure
5. Anon role permissions
6. Anon-callable functions
7. SECURITY DEFINER risks
8. Storage bucket security
9. Storage policies
10. Realtime security
11. Data volume analysis
12. Auth status
+ Summary scorecard
Trigger phrases: "full security audit", "check everything", "security posture", "complete Supabase audit"
Emergency /emergency-assessment

Emergency Assessment

For suspected breaches or leaked credentials. Provides read-only assessment queries and a structured response plan. Does not execute any changes.

Phase 1: Assess
  • Recent auth activity
  • Suspicious signups
  • Elevated roles
  • Unprotected tables
  • Public buckets
Phase 2: Contain
  • Regenerate anon key
  • Regenerate service_role key
  • New JWT secret
  • Reset DB password
Phase 3: Recover
  • Update env variables
  • Redeploy application
  • Restore access selectively
  • Ban suspicious accounts
Trigger phrases: "I think I've been hacked", "breach assessment", "credentials leaked", "emergency security check"

Individual Skills

Deep-dive into a specific security area

Open Source

All skills are open source. Browse the source, contribute, or fork for your own project.

View on GitHub