supabase-extract-db-string
skills-sh:yoanbernabeu_supabase-pentest-skills__supabase-extract-db-string
View sourceFirst Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
3
Score
76/100
Findings (3)
Detects database connection strings with credentials
postgresql://postgres:MySecretPass123@db.abc123.supabase.co: Remove the database connection string and replace it with an environment variable reference. Rotate the database password if the connection string was exposed publicly.
Likely FP if the connection string uses localhost with no password (e.g., mongodb://localhost:27017/mydb) or is a documented example URI.
Detects database connection strings with credentials
postgresql://postgres:pass@db.abc123.supabase.co: Remove the database connection string and replace it with an environment variable reference. Rotate the database password if the connection string was exposed publicly.
Likely FP if the connection string uses localhost with no password (e.g., mongodb://localhost:27017/mydb) or is a documented example URI.
Detects database connection strings with credentials
postgresql://postgres:MySecr***@db.abc123def.supabase.co: Remove the database connection string and replace it with an environment variable reference. Rotate the database password if the connection string was exposed publicly.
Likely FP if the connection string uses localhost with no password (e.g., mongodb://localhost:27017/mydb) or is a documented example URI.