AI-built app on Lovable exposed 18K users, researcher claims β€’ The Register

🚀 Explore this insightful post from Hacker News 📖

📂 **Category**:

✅ **What You’ll Learn**:

Vibe-coding platform Lovable has been accused of hosting apps riddled with vulnerabilities after saying users are responsible for addressing security issues flagged before publishing.

Taimur Khan, a tech entrepreneur with a background in software engineering, found 16 vulnerabilities – six of which he said were critical – in a single Lovable-hosted app that leaked more than 18,000 people’s data.

He declined to name the app during the disclosure process, although it was hosted on Lovable’s platform and showcased on its Discover page. The app had more than 100,000 views and around 400 upvotes at the time Khan began his probe.

The main issue, Khan said, was that all apps that are vibe-coded on Lovable’s platform are shipped with their backends powered by Supabase, which handles authentication, file storage, and real-time updates through a PostgreSQL database connection.

However, when the developer – in this case AI – or the human project owner fails to explicitly implement crucial security features like Supabase’s row-level security and role-based access, code will be generated that looks functional but in reality is flawed.

One example of this was a malformed authentication function. The AI that vibe-coded the Supabase backend, which uses remote procedure calls, implemented it with flawed access control logic, essentially blocking authenticated users and allowing access to unauthenticated users.

Khan said the intent was to block non-admins from accessing parts of the app, but the faulty implementation blocked all logged-in users – an error he said was repeated across multiple critical functions.

“This is backwards,” said Khan. “The guard blocks the people it should allow and allows the people it should block. A classic logic inversion that a human security reviewer would catch in seconds – but an AI code generator, optimizing for ‘code that works,’ produced and deployed to production.”

Because the app itself was a platform for creating exam questions and viewing grades, the userbase is naturally comprised of teachers and students. Some were from top US universities such as UC Berkeley and UC Davis, while there were “K-12 institutions with minors likely on the platform” as well, Khan said.

With the security flaws in place, an unauthenticated attacker could trivially access every user record, send bulk emails through the platform, delete any user account, grade student test submissions, and access organizations’ admin emails, for example.

Of the 18,697 total user records exposed, 14,928 contained unique email addresses. The dataset included 4,538 student accounts – all with email addresses – 10,505 enterprise users, and 870 users whose full PII was exposed.

The security flaws here are not exclusive to apps hosted by Lovable; the issue is broader and well-told by now.

Vibe coding, Collins Dictionary’s Word of the Year for 2025, promised to break down software development’s steep learning curve and empower any prompt jockey to bring their app ideas to life.

However, when AI isn’t generating slop bug reports in pursuit of lucrative bug bounties or catastrophically forgoing instructions, it can be found spewing glitzy-looking apps laden with vulnerabilities.

Veracode, for instance, recently found that 45 percent of AI-generated code contained security flaws, not to mention the myriad tales of woe reported by The Register in recent months.

Khan said he believes Lovable should take responsibility for the security of the apps it hosts, and was especially peeved when, after reporting his findings via company support, his ticket was reportedly closed without response.

“If Lovable is going to market itself as a platform that generates production-ready apps with authentication ‘included,’ it bears some responsibility for the security posture of the apps it generates and promotes,” Khan said.

“You can’t showcase an app to 100,000 people, host it on your own infrastructure, and then close the ticket when someone tells you it’s leaking user data. At minimum, a basic security scan of showcased applications would have caught every critical finding in this report.”

Lovable told The Register that the company has contacted the owner of the app in question and takes “any findings of this kind extremely seriously.”

Regarding the closed ticket, Lovable CISO Igor Andriushchenko said that the company only received “a proper disclosure report” on the evening of February 26 and acted on the findings “within minutes.”

“Any project built with Lovable includes a free security scan before publishing,” Andriushchenko told The Register. “This scan checks for vulnerabilities and, if found, provides recommendations on actions to take to resolve before publishing.

“Ultimately, it is at the discretion of the user to implement these recommendations. In this case, that implementation did not happen.

“This project also includes code not generated by Lovable and the vulnerable database is not hosted by Lovable. We have been in contact with the creator of the app, who is now addressing the issue.” ®

⚡ **What’s your take?**
Share your thoughts in the comments below!

#️⃣ **#AIbuilt #app #Lovable #exposed #18K #users #researcher #claims #Register**

🕒 **Posted on**: 1772216362

🌟 **Want more?** Click here for more info! 🌟

By

Leave a Reply

Your email address will not be published. Required fields are marked *