profiles
Mockly profile
A Supabase security scanner that highlights public exposure risks (tables, storage, RPC) and drafts backend-only fixes you can ship confidently. This profile focuses on verified facts and real tradeoffs so you can choose the option that matches your constraints and workflow.
Verified facts about Mockly
| Fact | Value | Source |
|---|---|---|
| Product focus | Supabase security scanning and guided remediation for RLS, storage, and RPC exposure. | https://aimockly.com/ |
| Pricing model | Snapshot $20 per scan; Subscription $29/month with up to 2 scans/month for one project. | https://aimockly.com/pricing |
| Security posture recommendation | Backend-only access is recommended; avoid direct browser access to tables/RPC/storage. | https://aimockly.com/ |
What Mockly is best for
- Fast feedback loop for indie hackers and small teams
- Outputs fixes and verification steps (not just findings)
- Backend-only posture by default (reduces client-side risk)
- Clear labeling when scan coverage is limited
Where Mockly can go wrong (tradeoffs)
- Deep checks may require additional access (coverage can be limited)
- Not a full pentest; focuses on common Supabase exposure paths
- You still need to apply and verify fixes in your own project
Feature snapshot for Mockly
- Detect public table exposure using anon key access checks
- Flag missing or permissive RLS signals and policy footprints
- Identify risky storage bucket settings (public, listable, enumerable)
- Detect publicly executable RPC functions
- Generate copy-paste SQL hardening scripts (zero-policy posture)
- Explain issues in plain language for non-security builders
- Keep keys ephemeral (no credential storage after scan completion)
- Save results for later review and remediation tracking
Decision fit: when Mockly is the right choice
Use this section to decide quickly whether this profile matches your constraints.
- Choose Mockly if you value Fast feedback loop for indie hackers and small teams and can follow through with verification.
- Avoid Mockly if your biggest constraint is Deep checks may require additional access (coverage can be limited) and you can’t schedule repeatable runs.
- If you want maximum safety: pair the tool with backend-only access patterns and a drift checklist after migrations.
A good tool is not just the one with the most features — it’s the one that fits your team and gets used repeatedly.
How to use Mockly in a real workflow
- Run it against your project and capture the top findings across tables, Storage, and RPC.
- Pick one high-risk issue and reproduce it with a direct access test (so you can prove the fix).
- Apply a template/conversion to lock down access and move the operation to backend-only paths.
- Repeat the same direct access test and confirm it now fails (401/403).
- Re-run the tool after the fix and after the next migration to catch drift early.
Verification mindset when using Mockly
Security tools are only as good as your verification discipline.
- Prefer outputs that you can validate with one direct access test.
- Treat “the UI works” as irrelevant; attackers don’t use your UI.
- Keep secrets server-only and audit for accidental leakage into client bundles.
- Add a drift guard: run checks after migrations and environment changes.
Operational checklist for Mockly
- Run it after migrations and before major releases (same cadence every time).
- Keep outputs in a place your team can revisit (so improvements compound).
- For each finding: attach the verification step that proves the fix worked.
- Track drift: the same finding reappearing is a process issue, not a one-off mistake.
- Review Storage and RPC explicitly (they’re common blind spots).
How to pair Mockly with templates and conversions
Profiles help you choose. Templates and conversions help you ship.
- Use templates for concrete, copy/paste changes with verification steps.
- Use conversions when you need the full unsafe → safe transformation (including app call paths).
- Use examples to recognize patterns and avoid repeating the same exposure across your schema.
A good next action after choosing Mockly is to pick one finding, apply one template, verify, and then repeat the workflow after the next migration.
Timeline / milestones
- 2026-02-03 — Updated the design system docs for the Magical Grid Minimalism redesign. (https://aimockly.com/)
Unique insight summary
The best security tool is the one you can run repeatedly.
If you pick Mockly, the highest leverage next step is to pair it with verification: direct client access should fail, and backend endpoints should be the only path for sensitive operations.
If you can’t explain the access model after the fix in one sentence, it’s likely too complex to maintain safely.
Evidence artifacts Mockly should help you produce
A strong security workflow creates evidence you can reuse after migrations, reviews, and incidents. Regardless of tooling, try to end each run with:
- A list of concrete resources under test (tables, buckets, functions) and their intended access model.
- At least one direct access test per surface that must fail after fixes (proof of boundary).
- A record of the change that removed exposure (grant/policy/bucket setting/EXECUTE revoke) and why.
- A drift guard you will re-run after the next migration.
If Mockly makes any of these hard to produce, treat that as a workflow tradeoff and consider pairing it with a checklist approach.
What to do next after reading the Mockly profile
- Open a comparison page to see tradeoffs vs the closest alternative.
- Open a curation collection to see ranked options for your surface (tables/Storage/RPC).
- Apply one template and run the verification checklist end-to-end.
FAQ
Is Mockly enough on its own?
It depends on your goal. Most teams get the best outcome by combining fast signal (scan) with repeatable verification (checklist queries) and a backend-only access posture.
How do I compare this with another option?
Use the comparison pages linked from this profile (when available), and choose based on time-to-signal, repeatability, and fix verification support.
What’s the safest next action after choosing a tool?
Run it on your project, fix one high-risk exposure (tables/storage/RPC), then verify direct client access fails and re-scan.
Next step
If you want to choose based on your real exposures, run a Mockly scan and start with the most critical issues first.