Skip to main content
Noah can analyze your application code for common security vulnerabilities, insecure patterns, and dependency risks. Use code security reviews throughout development to catch issues before they reach production.

What Noah Checks

Noah’s code security analysis covers multiple areas of your application:

Application Code

Noah scans your frontend and backend code for common vulnerability patterns:
  • Cross-Site Scripting (XSS) — Unsafe rendering of user input
  • Injection attacks — SQL injection, command injection, and other injection vectors
  • Authentication flaws — Insecure login flows, missing session validation
  • Insecure API calls — Exposed endpoints, missing rate limiting
  • Hardcoded secrets — API keys or credentials embedded in source code
  • Unsafe data handling — Missing input validation, improper sanitization

Dependencies

Third-party libraries can introduce security risks. Noah can review your project’s npm dependencies for known vulnerabilities:
  • Known CVEs — Publicly disclosed vulnerabilities in packages you use
  • Outdated packages — Dependencies with available security patches
  • Severity levels — Critical, high, medium, and low risk classification

Database Security (Supabase)

If your project uses Supabase, Noah can review your database security:
  • Row-Level Security (RLS) — Whether RLS is enabled and properly configured on your tables
  • Overly permissive policies — Policies that expose more data than intended
  • Missing access controls — Tables without any RLS policies

How to Run a Security Review

Ask Noah to review your code at any time by prompting in chat: Full application review:
“Review my app’s security”
“Check my code for security vulnerabilities”
Focused reviews:
“Review the authentication flow in my app”
“Check if my API routes are secure”
“Are my RLS policies configured correctly?”
“Check my npm dependencies for vulnerabilities”
Noah will analyze the relevant code and respond with findings, explanations, and specific fixes.

Understanding Findings

Noah categorizes security findings by severity:
SeverityDescriptionAction
CriticalExploitable vulnerabilities that could lead to data loss, fund theft, or unauthorized accessFix immediately
HighSerious issues that should be addressed before deploymentFix before going live
MediumIssues that could become risks under certain conditionsReview and fix when possible
LowMinor issues or best-practice improvementsConsider implementing

Fixing Security Issues

When Noah identifies security issues, you can:
  1. Let Noah fix it — Ask Noah to apply the recommended fix directly
  2. Review and fix manually — Use the findings as guidance to make changes yourself
  3. Ask for clarification — Ask Noah to explain why something is a risk and what the impact could be
Example:
“Fix the XSS vulnerability you found in the profile page”
“Add RLS policies to the orders table so users can only see their own orders”
“Update the vulnerable packages in my project”

Prompt Cookbook

ScenarioPrompt
Pre-deployment checkReview my app's security before I publish it
After adding authCheck if my authentication implementation is secure
Database reviewReview my Supabase tables for missing RLS policies
Dependency checkAre any of my npm packages vulnerable?
Specific componentCheck the payment form component for security issues
Smart contract + appReview both my smart contract and frontend for security vulnerabilities

Best Practices

Security is an ongoing process. Run reviews after major changes, new feature additions, or dependency updates.
Address critical and high-severity findings before lower-priority ones. These represent the most exploitable vulnerabilities.
Use Noah’s analysis as a starting point, but manually review sensitive areas like authentication, payment flows, and admin functionality.
After applying security fixes, test your app to make sure the fix works and doesn’t break existing functionality.
Only include packages you actually use. Fewer dependencies means fewer potential vulnerabilities.

FAQ

Yes, conversational security reviews in chat consume credits like regular messages.
Noah can fix many common security issues automatically. Complex or architectural security problems may require manual intervention with Noah’s guidance.
The smart contract audit generates a downloadable PDF report specifically for on-chain programs. Code security reviews analyze your full application — frontend, backend, dependencies, and database configuration.