Platform Security
Security Scanner for Bolt.new Apps
Bolt.new ships full-stack apps in seconds. But unauthenticated API routes and exposed secrets mean your app could be compromised in seconds too. ShipSafe finds what Bolt's AI missed.
The Security Cost of Instant Full-Stack Apps
Bolt.new is impressive. You describe what you want, and it generates a complete application with frontend, backend, and database in one shot. The problem is that the AI skips the boring but critical security plumbing that separates a demo from a production app.
Every API route Bolt creates is a potential entry point for attackers. Without auth checks, anyone can call them. Without input validation, malicious payloads flow straight through. And because Bolt uses Vite, any secret prefixed with VITE_ ends up in your users' browsers.
We've documented the specific patterns in our Bolt.new security guide and the vulnerabilities by platform reference.
Common Vulnerabilities in Bolt.new Projects
These patterns appear in the vast majority of Bolt.new-generated applications we analyze.
Unauthenticated API Routes
Bolt.new generates API endpoints that handle data mutations (create, update, delete) without verifying that the caller is logged in. Anyone who discovers the route can call it directly with curl or Postman, bypassing your entire frontend. This is especially dangerous for admin operations and payment workflows.
Secrets in VITE_ Environment Variables
Bolt.new uses Vite as its build tool, and any env var prefixed with VITE_ gets bundled into the frontend JavaScript. The AI frequently puts API keys, database URLs, and webhook secrets behind VITE_ prefixes, making them visible to anyone who opens browser DevTools.
Missing Input Validation
Bolt-generated endpoints typically trust all incoming data. There is no schema validation, no type checking, and no sanitization. Malformed payloads, oversized inputs, and injection attempts pass straight through to your database or downstream services.
No CSRF Protection
Bolt.new does not generate CSRF tokens or SameSite cookie configurations. State-changing requests can be triggered from any website by embedding a hidden form or making a fetch request, letting attackers perform actions on behalf of logged-in users.
How ShipSafe Secures Your Bolt.new App
Connect Your Bolt.new Project
Link your GitHub repo or paste your source code. ShipSafe recognizes Bolt.new's Vite-based project structure and understands how it handles routing and env vars.
Full-Stack Security Analysis
ShipSafe scans both frontend and backend code. It maps every API route, checks for auth middleware, validates env var scoping, and tests for CSRF and input validation gaps.
Prioritized Fix Guide
Receive a severity-ranked report with concrete code examples showing exactly what to change. Copy-paste the fixes directly into your Bolt.new project.
Frequently Asked Questions
Is Bolt.new code secure?
What security issues does Bolt.new create?
How do I secure my Bolt.new app?
Does ShipSafe work with Bolt.new projects?
Don't Deploy Bolt.new Without a Security Scan
Four out of five Bolt.new projects we scan have at least one critical vulnerability. Find yours before someone else does.
Start Free ScanNo credit card required. See all plans