Database Sentinel
Supabase audit
Finding
The table loads, but the access rule has not been checked yet.
The UI works. Login works. The demo feels fine. But one loose policy can still expose user data.
Database Sentinel
Supabase audit
Finding
The table loads, but the access rule has not been checked yet.
RLS, service keys, storage buckets, auth roles. These are easy to miss when you build fast.
Database Sentinel
Supabase audit
Finding
Service key and permissive policy paths get flagged before launch.
A Claude Skill that audits the database and gives you the fix.
Free · Open source · MIT licensed · made by Parth Jha (Farenhyte)
Database Sentinel
Supabase audit
Finding
Sentinel returns the failing rule, why it matters, and the exact fix.
What it does
Find the backend
Detects Supabase, MongoDB, and the database files in the project.
database-sentinel audit
checks complete. report includes risk, proof, and fix.
From the lab
Rehearsal AI is a real product with real user data. As it grew on Supabase, one question kept coming back: do the database rules protect users as carefully as the interface suggests?
Database Sentinel came from that work. It checks the quiet parts of an app: RLS policies, storage rules, exposed keys, auth roles, and database access paths.
It sits beside Context Hub in the Jaipuria AI Labs open-source tooling layer around Rehearsal: one tool helps AI systems keep context, the other helps builders keep data boundaries.
FAQ
Database Sentinel is an open-source Claude Skill that checks whether your database is safe before launch. It audits policies, secrets, roles, storage rules, and access paths so fast-moving teams can catch data exposure before users do.
Open source. MIT licensed. Built for teams shipping fast with AI, Supabase, MongoDB, and modern app stacks.