Firebase Security
Security checks for Firebase projects. Firestore rules, Realtime Database, Storage, Authentication, and Cloud Functions.
7 vulnerabilities
Firestore Rules Allow Read/Write True
criticalFirestore security rules set to 'allow read, write: if true' give any user — authenticated or not — full access to read, create, modify, and delete all documents.
Realtime Database Without Authentication
criticalFirebase Realtime Database rules set '.read: true' and '.write: true' at the root level, allowing anyone on the internet to read and modify all data.
Firebase Storage Rules Permissive
highFirebase Cloud Storage rules allow any user to read, write, or delete files without authentication, exposing uploaded content and enabling file tampering.
Cascading Rules Misconfigured
highParent-level Firebase rules override restrictive child rules, unintentionally granting broader access than intended to nested collections and documents.
Firebase API Key Exposed in Code
mediumFirebase configuration (apiKey, projectId, databaseURL) is hardcoded in JavaScript bundles and publicly accessible, enabling attackers to interact with your Firebase services.
Firebase Auth Without Restrictions
mediumFirebase Authentication allows sign-up without email verification, enabling attackers to create unlimited accounts and abuse authenticated-only features.
Cloud Functions Without Validation
highFirebase Cloud Functions exposed as HTTP endpoints accept and process requests without verifying authentication tokens or validating input data.