supabase-audit-buckets-public
npx skills add https://github.com/yoanbernabeu/supabase-pentest-skills --skill supabase-audit-buckets-public
Agent 安装分布
Skill 文档
Public Bucket Audit
ð´ CRITICAL: PROGRESSIVE FILE UPDATES REQUIRED
You MUST write to context files AS YOU GO, not just at the end.
- Write to
.sb-pentest-context.jsonIMMEDIATELY after each bucket analyzed- Log to
.sb-pentest-audit.logBEFORE and AFTER each test- DO NOT wait until the skill completes to update files
- If the skill crashes or is interrupted, all prior findings must already be saved
This is not optional. Failure to write progressively is a critical error.
This skill specifically focuses on identifying misconfigured public buckets and exposed sensitive content.
When to Use This Skill
- Quick check for public bucket misconfigurations
- When you suspect sensitive data in public storage
- As a focused security check for storage
- Before deploying to production
Prerequisites
- Supabase URL and anon key available
Why Public Buckets Are Risky
Public buckets allow:
| Access Type | Description |
|---|---|
| Direct URL | Anyone with the URL can download |
| Enumeration | File listing may be possible |
| No Auth | No authentication required |
| Caching | CDN may cache sensitive files |
Common Misconfiguration Scenarios
- Development mistake â Bucket set public during development
- Wrong bucket â Sensitive file uploaded to public bucket
- Legacy â Bucket was public before RLS existed
- Intentional but wrong â Assumed “nobody knows the URL”
Usage
Quick Public Bucket Check
Check for misconfigured public buckets
Deep Scan
Deep scan public buckets for sensitive content
Output Format
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
PUBLIC BUCKET SECURITY AUDIT
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Project: abc123def.supabase.co
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Public Bucket Discovery
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Public Buckets Found: 3/5
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
1. avatars â
APPROPRIATE
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Status: Public (Expected)
Purpose: User profile pictures
Content Analysis:
âââ All files are images (jpg, png, webp)
âââ No sensitive filenames detected
âââ File sizes appropriate for avatars (< 1MB)
âââ No metadata concerns
Assessment: This bucket appropriately contains only
public user-facing content.
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
2. uploads ð P1 - NEEDS REVIEW
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Status: Public (Unexpected for this content)
Purpose: User file uploads
Content Analysis:
âââ Mixed file types (PDF, DOC, images)
âââ Some sensitive filenames detected
âââ Should likely be private with RLS
Sensitive Content Indicators:
âââ 12 files with 'invoice' in name
âââ 8 files with 'contract' in name
âââ 3 files with 'passport' in name
âââ 156 PDF files (may contain sensitive data)
Risk Assessment:
âââ ð User-uploaded content publicly accessible
Anyone with filename can access any user's files
Recommendation:
```sql
-- Make bucket private
UPDATE storage.buckets
SET public = false
WHERE name = 'uploads';
-- Add user-specific RLS
CREATE POLICY "Users access own uploads"
ON storage.objects FOR ALL
USING (
bucket_id = 'uploads'
AND auth.uid()::text = (storage.foldername(name))[1]
);
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ 3. backups ð´ P0 – CRITICAL MISCONFIGURATION âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Status: Public (SHOULD NEVER BE PUBLIC) Purpose: Database backups
â ï¸ CRITICAL: Backup files publicly accessible!
Exposed Content: âââ ð´ db-backup-2025-01-30.sql (125MB) â âââ Full database dump with all user data âââ ð´ db-backup-2025-01-29.sql (124MB) â âââ Previous day backup âââ ð´ users-export.csv (2.3MB) â âââ User data export with emails, names âââ ð´ secrets.env (1KB) â âââ Contains API keys and passwords! âââ ð´ .env.production (1KB) âââ Production environment secrets!
Public URLs (Currently Accessible): https://abc123def.supabase.co/storage/v1/object/public/backups/db-backup-2025-01-30.sql https://abc123def.supabase.co/storage/v1/object/public/backups/secrets.env
Impact: âââ Complete database can be downloaded âââ All user PII exposed âââ All API secrets exposed âââ Full application compromise possible
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ ð¨ IMMEDIATE ACTION REQUIRED ð¨ âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
-
MAKE BUCKET PRIVATE NOW:
UPDATE storage.buckets SET public = false WHERE name = 'backups'; -
DELETE PUBLIC FILES: Delete or move all sensitive files from public access
-
ROTATE ALL EXPOSED SECRETS:
- Stripe API keys
- Database passwords
- JWT secrets
- Any other keys in exposed files
-
AUDIT ACCESS LOGS: Check if files were accessed by unauthorized parties
-
INCIDENT RESPONSE: Consider this a data breach and follow your incident response procedures
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ Summary âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Public Buckets: 3 âââ â Appropriate: 1 (avatars) âââ ð P1 Review: 1 (uploads) âââ ð´ P0 Critical: 1 (backups)
Exposed Sensitive Files: 47 Exposed Secret Files: 2
Critical Finding: Database backups and secrets publicly accessible via direct URL
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
## Bucket Classification
The skill classifies buckets by content:
| Classification | Criteria | Action |
|----------------|----------|--------|
| **Appropriate Public** | Profile images, public assets | None needed |
| **Needs Review** | User uploads, mixed content | Consider making private |
| **Critical Misconfiguration** | Backups, secrets, exports | Immediate remediation |
## Sensitive Content Patterns
### P0 - Critical (Never Public)
- `*.sql` - Database dumps
- `*.env*` - Environment files
- `*secret*`, `*credential*` - Secrets
- `*backup*` - Backup files
- `*export*` - Data exports
### P1 - High (Usually Private)
- `*invoice*`, `*payment*` - Financial
- `*contract*`, `*agreement*` - Legal
- `*passport*`, `*id*`, `*license*` - Identity
- User-uploaded documents
### P2 - Medium (Review Needed)
- Configuration files
- Log files
- Debug exports
## Context Output
```json
{
"public_bucket_audit": {
"timestamp": "2025-01-31T12:00:00Z",
"public_buckets": 3,
"findings": [
{
"bucket": "backups",
"severity": "P0",
"issue": "Database backups and secrets publicly accessible",
"exposed_files": 45,
"critical_files": [
"db-backup-2025-01-30.sql",
"secrets.env",
".env.production"
],
"remediation": "Make bucket private immediately, rotate secrets"
}
]
}
}
Prevention Checklist
After fixing issues, implement these controls:
1. Default Private Buckets
-- Supabase creates buckets public by default in UI
-- Always verify and change to private if needed
UPDATE storage.buckets
SET public = false
WHERE name = 'new-bucket';
2. Restrict Bucket Creation
-- Only allow admin to create buckets
REVOKE INSERT ON storage.buckets FROM authenticated;
REVOKE INSERT ON storage.buckets FROM anon;
3. File Upload Validation
// Validate file type before upload
const allowedTypes = ['image/jpeg', 'image/png'];
if (!allowedTypes.includes(file.type)) {
throw new Error('Invalid file type');
}
// Use user-specific paths
const path = `${user.id}/${file.name}`;
await supabase.storage.from('uploads').upload(path, file);
4. Regular Audits
Run this skill regularly:
- Before each production deployment
- Weekly automated scans
- After any storage configuration changes
MANDATORY: Progressive Context File Updates
â ï¸ This skill MUST update tracking files PROGRESSIVELY during execution, NOT just at the end.
Critical Rule: Write As You Go
DO NOT batch all writes at the end. Instead:
- Before analyzing each bucket â Log the action to
.sb-pentest-audit.log - After each misconfiguration found â Immediately update
.sb-pentest-context.json - After each sensitive file detected â Log the finding immediately
This ensures that if the skill is interrupted, crashes, or times out, all findings up to that point are preserved.
Required Actions (Progressive)
-
Update
.sb-pentest-context.jsonwith results:{ "public_bucket_audit": { "timestamp": "...", "public_buckets": 3, "findings": [ ... ] } } -
Log to
.sb-pentest-audit.log:[TIMESTAMP] [supabase-audit-buckets-public] [START] Auditing public buckets [TIMESTAMP] [supabase-audit-buckets-public] [FINDING] P0: backups bucket is public [TIMESTAMP] [supabase-audit-buckets-public] [CONTEXT_UPDATED] .sb-pentest-context.json updated -
If files don’t exist, create them before writing.
FAILURE TO UPDATE CONTEXT FILES IS NOT ACCEPTABLE.
MANDATORY: Evidence Collection
ð Evidence Directory: .sb-pentest-evidence/04-storage-audit/public-url-tests/
Evidence Files to Create
| File | Content |
|---|---|
public-url-tests/[bucket]-access.json |
Public URL access test results |
public-url-tests/sensitive-content.json |
Sensitive content found |
Evidence Format
{
"evidence_id": "STG-PUB-001",
"timestamp": "2025-01-31T10:45:00Z",
"category": "storage-audit",
"type": "public_bucket_audit",
"severity": "P0",
"bucket": "backups",
"public_url_test": {
"url": "https://abc123def.supabase.co/storage/v1/object/public/backups/secrets.env",
"curl_command": "curl -I 'https://abc123def.supabase.co/storage/v1/object/public/backups/secrets.env'",
"response_status": 200,
"content_type": "text/plain",
"accessible": true
},
"assessment": {
"classification": "critical_misconfiguration",
"should_be_public": false,
"contains_sensitive_data": true,
"file_types_exposed": ["sql", "env", "csv"]
},
"remediation": {
"immediate": "UPDATE storage.buckets SET public = false WHERE name = 'backups';",
"secrets_to_rotate": ["All keys in secrets.env"],
"incident_response": "Consider this a data breach"
}
}
Related Skills
supabase-audit-buckets-listâ List all bucketssupabase-audit-buckets-readâ Test file accesssupabase-reportâ Generate comprehensive report