充满氛围、可爱风格的应用,暴露了基本缺陷,影响了1.8万用户。
Vibe coded Lovable-hosted app littered with basic flaws exposed 18K users

原始链接: https://www.theregister.com/2026/02/27/lovable_app_vulnerabilities/

## 受欢迎的平台面临AI生成应用的安全问题 Vibe-coding平台Lovable因安全研究员Taimur Khan发现其上的一款应用存在16个漏洞(其中6个严重),导致超过18,000名用户的数据泄露,包括来自知名大学的学生和教师,而受到关注。 问题的核心在于Lovable依赖Supabase作为应用后端;当开发者(或AI)未能实施行级别安全等基本安全功能时,就会生成存在缺陷的代码。 Khan发现了一个关键的身份验证漏洞,允许未经授权访问用户数据,这表明AI有可能创建功能齐全但不可安全的应用。 Lovable认为用户有责任在发布前解决标记出的安全问题,并提供免费的安全扫描。 然而,Khan认为这不足够,尤其是在Lovable积极推广这些应用的情况下。 Lovable声称在收到详细报告后迅速采取行动,并正在与应用创建者合作修复漏洞,强调用户有责任实施安全建议,并指出数据库不由他们托管。 这起事件凸显了人们对AI生成代码安全性的日益担忧,最近的报告表明存在高比例的缺陷。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 Vibe 编码的、Lovable 托管的应用,充斥着基本漏洞,暴露了 18K 用户 (theregister.com) 20 分,由 nottorp 45 分钟前发布 | 隐藏 | 过去 | 收藏 | 讨论 帮助 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系方式 搜索:
相关文章

原文

Vibe-coding platform Lovable has been accused of hosting apps riddled with vulnerabilities after saying users are responsible for addressing security issues flagged before publishing.

Taimur Khan, a tech entrepreneur with a background in software engineering, found 16 vulnerabilities – six of which he said were critical – in a single Lovable-hosted app that leaked more than 18,000 people's data.

He declined to name the app during the disclosure process, although it was hosted on Lovable's platform and showcased on its Discover page. The app had more than 100,000 views and around 400 upvotes at the time Khan began his probe.

The main issue, Khan said, was that all apps that are vibe-coded on Lovable's platform are shipped with their backends powered by Supabase, which handles authentication, file storage, and real-time updates through a PostgreSQL database connection.

However, when the developer – in this case AI – or the human project owner fails to explicitly implement crucial security features like Supabase's row-level security and role-based access, code will be generated that looks functional but in reality is flawed.

One example of this was a malformed authentication function. The AI that vibe-coded the Supabase backend, which uses remote procedure calls, implemented it with flawed access control logic, essentially blocking authenticated users and allowing access to unauthenticated users.

Khan said the intent was to block non-admins from accessing parts of the app, but the faulty implementation blocked all logged-in users – an error he said was repeated across multiple critical functions.

"This is backwards," said Khan. "The guard blocks the people it should allow and allows the people it should block. A classic logic inversion that a human security reviewer would catch in seconds – but an AI code generator, optimizing for 'code that works,' produced and deployed to production."

Because the app itself was a platform for creating exam questions and viewing grades, the userbase is naturally comprised of teachers and students. Some were from top US universities such as UC Berkeley and UC Davis, while there were "K-12 institutions with minors likely on the platform" as well, Khan said.

With the security flaws in place, an unauthenticated attacker could trivially access every user record, send bulk emails through the platform, delete any user account, grade student test submissions, and access organizations' admin emails, for example.

Of the 18,697 total user records exposed, 14,928 contained unique email addresses. The dataset included 4,538 student accounts – all with email addresses – 10,505 enterprise users, and 870 users whose full PII was exposed.

The security flaws here are not exclusive to apps hosted by Lovable; the issue is broader and well-told by now.

Vibe coding, Collins Dictionary's Word of the Year for 2025, promised to break down software development's steep learning curve and empower any prompt jockey to bring their app ideas to life.

However, when AI isn't generating slop bug reports in pursuit of lucrative bug bounties or catastrophically forgoing instructions, it can be found spewing glitzy-looking apps laden with vulnerabilities.

Veracode, for instance, recently found that 45 percent of AI-generated code contained security flaws, not to mention the myriad tales of woe reported by The Register in recent months.

Khan said he believes Lovable should take responsibility for the security of the apps it hosts, and was especially peeved when, after reporting his findings via company support, his ticket was reportedly closed without response.

"If Lovable is going to market itself as a platform that generates production-ready apps with authentication 'included,' it bears some responsibility for the security posture of the apps it generates and promotes," Khan said.

"You can't showcase an app to 100,000 people, host it on your own infrastructure, and then close the ticket when someone tells you it's leaking user data. At minimum, a basic security scan of showcased applications would have caught every critical finding in this report."

Lovable told The Register that the company has contacted the owner of the app in question and takes "any findings of this kind extremely seriously."

Regarding the closed ticket, Lovable CISO Igor Andriushchenko said that the company only received "a proper disclosure report" on the evening of February 26 and acted on the findings "within minutes."

"Any project built with Lovable includes a free security scan before publishing," Andriushchenko told The Register. "This scan checks for vulnerabilities and, if found, provides recommendations on actions to take to resolve before publishing.

"Ultimately, it is at the discretion of the user to implement these recommendations. In this case, that implementation did not happen.

"This project also includes code not generated by Lovable and the vulnerable database is not hosted by Lovable. We have been in contact with the creator of the app, who is now addressing the issue." ®

联系我们 contact @ memedata.com