Authentication
We check whether logged-out users can reach protected routes, whether sessions are enforced consistently, and whether role checks happen server-side.
AI-generated apps often look complete before the security model is complete. We review the places where founder-built prototypes usually fail: keys, data rules, route protection, admin workflows, payments, and permissions.
The review focuses on failures that can expose customer data, run up third-party bills, or give the wrong user access to privileged workflows.
We check whether logged-out users can reach protected routes, whether sessions are enforced consistently, and whether role checks happen server-side.
We inspect database policies, table exposure, storage bucket permissions, API endpoints, and whether one tenant can read another tenant's records.
We look for Stripe, OpenAI, Anthropic, email, storage, webhook, and database secrets that accidentally shipped to the browser or public repo history.
These are the issues that matter most before you invite real users or connect production data.
The goal is not to shame AI-built code. The goal is to identify the few security issues that can actually hurt the business.