Learn
Security

Can Someone Hack My Bolt App?

Bolt apps are protected by WebContainer isolation during development, but once deployed, they face the same security risks as any web app. The main vulnerabilities are exposed API keys, missing authentication on routes, and misconfigured database access if you use an external database like Supabase.

Why this matters

Bolt.new's WebContainers protect your development environment by running code in an isolated browser sandbox. But this isolation does not carry over to your deployed app. Once live, your app's security depends entirely on your code and configuration.

What's at stake

A deployed Bolt app with exposed secrets or missing auth can be exploited to steal API keys, access user data, or run up charges on your third-party service accounts.

In detail.

How Bolt Apps Get Hacked

1. Exposed API Keys

If secrets are not stored in Bolt V2's Project Settings and accessed through Edge Functions, they may end up in your frontend JavaScript bundle where anyone can see them using browser DevTools.

2. Missing Authentication

Bolt V2 includes native authentication with email/password and leaked password detection, but you need to enable it. Without authentication, any route in your app is accessible to anyone.

3. Unprotected Database

If you connect Bolt to an external database (Supabase, PostgreSQL), you must configure access controls. Without RLS or equivalent protections, your data is exposed.

4. Unpatched Security Audit Issues

Bolt V2 includes a security audit that flags vulnerabilities. If you deploy without addressing these flags, you ship known security issues.

How to Protect Your Bolt App

  1. Store all secrets in Bolt V2 Project Settings — access them only through Edge Functions
  2. Enable native authentication or integrate an external auth provider
  3. Run the security audit in Bolt V2 and fix all flagged issues before deploying
  4. Configure database security — enable RLS if using Supabase
  5. Check your deployed app — open DevTools and search for API key strings in the Sources tab

Verify your Bolt app is secure before hackers test it for you

  • Automated security checks tailored to Bolt-built applications
  • API key exposure detection in your deployed frontend
  • Public security badge showing your app passed verification
Get started with BWORLDS

Frequently asked questions.

No. WebContainers protect your development environment by isolating code execution in the browser. Once your app is deployed to Netlify, Vercel, or Bolt Cloud, it runs as a standard web application without WebContainer isolation.

Bolt V2 adds a security audit, native authentication, and secure secrets management. But you must review the audit results and fix issues yourself — security is not fully automatic.

Exposed API keys. If your secrets are not stored in Project Settings and accessed through Edge Functions, they may appear in your frontend code. Anyone viewing your JavaScript bundle can extract them.

Frontend JavaScript is always visible in the browser — this applies to all web apps. Your server-side code in Edge Functions is not exposed. The risk is when secrets or sensitive logic end up in client-side code.