SKILL.md
$27
When a user reports a SQL-created table is unexpectedly inaccessible, check their Data API settings and whether the roles have been granted access via explicit GRANT SQL. When granting public (anon/authenticated) access, always enable RLS too. See Exposing a Table to the Data API for the full setup workflow.
5. RLS in exposed schemas.
Enable RLS on every table in any exposed schema, which includes public by default. This is critical in Supabase because tables in exposed schemas can be reachable through the Data API when the anon/authenticated roles have access (see Exposing a Table to the Data API). For private schemas, prefer RLS as defense in depth. After enabling RLS, create policies that match the actual access model rather than defaulting every table to the same auth.uid() pattern.
6. Security checklist.
When working on any Supabase task that touches auth, RLS, views, storage, or user data, run through this checklist. These are Supabase-specific security traps that silently create vulnerabilities:
-
Auth and session security
- **Never use
user_metadataclaims in JWT-based authorization decisions.** In Supabase,raw_user_meta_datais user-editable and can appear inauth.jwt(), so it is unsafe for RLS policies or any other authorization logic. Store authorization data inraw_app_meta_data/app_metadatainstead.
- Deleting a user does not invalidate existing access tokens. Sign out or revoke sessions first, keep JWT expiry short for sensitive apps, and for strict guarantees validate
session_idagainstauth.sessionson sensitive operations.
- **If you use
app_metadataorauth.jwt()for authorization, remember JWT claims are not always fresh until the user's token is refreshed.**
-
API key and client exposure
- **Never expose the
service_roleor secret key in public clients.** Prefer publishable keys for frontend code. Legacyanonkeys are only for compatibility. In Next.js, anyNEXT_PUBLIC_env var is sent to the browser.
-
RLS, views, and privileged database code
- Views bypass RLS by default. In Postgres 15 and above, use
CREATE VIEW ... WITH (security_invoker = true). In older versions of Postgres, protect your views by revoking access from theanonandauthenticatedroles, or by putting them in an unexposed schema.
- UPDATE requires a SELECT policy. In Postgres RLS, an UPDATE needs to first SELECT the row. Without a SELECT policy, updates silently return 0 rows — no error, just no change.
- **
auth.role()is deprecated — use theTOclause instead.** Supabase has deprecatedauth.role()in favour of specifying the target role directly on the policy withTO authenticatedorTO anon. Beyond deprecation,auth.role() = 'authenticated'breaks silently when anonymous sign-ins are enabled, because anonymous users carry theauthenticatedPostgres role and pass the check regardless of whether the user is genuinely signed in.
-- Deprecated (do not use)
create policy "example" on table_name for select
using ( auth.role() = 'authenticated' );
- **
TO authenticatedalone is authentication without authorization (BOLA / IDOR).** UsingTO authenticatedonly checks the role — it does not restrict which rows a user can access. The correct pattern combinesTO authenticatedwith an ownership predicate inUSING:
create policy "example" on table_name for select
to authenticated
using ( (select auth.uid()) = user_id );
- **UPDATE policies require both
USINGandWITH CHECK.** WithoutWITH CHECK, a user can reassign a row'suser_idto another user:
create policy "example" on table_name for update
to authenticated
using ( (select auth.uid()) = user_id )
with check ( (select auth.uid()) = user_id );
- **
SECURITY DEFINERfunctions bypass RLS.** ASECURITY DEFINERfunction runs with its creator's privileges — typically a role withbypassrls(e.g.,postgres). Never addSECURITY DEFINERto resolve a permission error; it silently removes access control without fixing the underlying cause. PreferSECURITY INVOKER.
- **
SECURITY DEFINERfunctions inpublicare callable by all roles.** Postgres grantsEXECUTEtoPUBLICby default for every new function, so anySECURITY DEFINERfunction inpublicis a public API endpoint callable byanonandauthenticated(which inherit fromPUBLIC) without any additional grant. WhenSECURITY DEFINERis genuinely needed (e.g., bypassing RLS on an internal lookup table), keep the function in a non-exposed schema, always include anauth.uid()check in the function body, and runsupabase db advisorsafter making changes.
-
Storage access control
- Storage upsert requires INSERT + SELECT + UPDATE. Granting only INSERT allows new uploads but file replacement (upsert) silently fails. You need all three.
For any security concern not covered above, fetch the Supabase product security index: https://supabase.com/docs/guides/security/product-security.md
Supabase CLI
Always discover commands via --help — never guess. The CLI structure changes between versions.
supabase --help # All top-level commands
supabase <group> --help # Subcommands (e.g., supabase db --help)
supabase <group> <command> --help # Flags for a specific command
Supabase CLI Known gotchas:
supabase db queryrequires CLI v2.79.0+ → use MCPexecute_sqlorpsqlas fallback
supabase db advisorsrequires CLI v2.81.3+ → use MCPget_advisorsas fallback
- When you need a new migration SQL file, always create it with
supabase migration new <name>first. Never invent a migration filename or rely on memory for the expected format.
Version check and upgrade: Run supabase --version to check. For CLI changelogs and version-specific features, consult the CLI documentation or GitHub releases.
Supabase MCP Server
For setup instructions, server URL, and configuration, see the MCP setup guide.
Troubleshooting connection issues — follow these steps in order:
-
Check if the server is reachable:
curl -so /dev/null -w "%{http_code}" https://mcp.supabase.com/mcp
A 401 is expected (no token) and means the server is up. Timeout or "connection refused" means it may be down.
-
**Check .mcp.json configuration:**
Verify the project root has a valid .mcp.json with the correct server URL. If missing, create one pointing to https://mcp.supabase.com/mcp.
-
Authenticate the MCP server:
If the server is reachable and .mcp.json is correct but tools aren't visible, the user needs to authenticate. The Supabase MCP server uses OAuth 2.1 — tell the user to trigger the auth flow in their agent, complete it in the browser, and reload the session.
Supabase Documentation
Before implementing any Supabase feature, find the relevant documentation. Use these methods in priority order:
- **MCP
search_docstool** (preferred — returns relevant snippets directly)
- Fetch docs pages as markdown — any docs page can be fetched by appending
.mdto the URL path.
- Web search for Supabase-specific topics when you don't know which page to look at.
Making and Committing Schema Changes
**To make schema changes, use execute_sql (MCP) or supabase db query (CLI).** These run SQL directly on the database without creating migration history entries, so you can iterate freely and generate a clean migration when ready.
Do NOT use apply_migration to change a local database schema — it writes a migration history entry on every call, which means you can't iterate, and supabase db diff / supabase db pull will produce empty or conflicting diffs. If you use it, you'll be stuck with whatever SQL you passed on the first try.
When ready to commit your changes to a migration file:
- Run advisors →
supabase db advisors(CLI v2.81.3+) or MCPget_advisors. Fix any issues.
- Review the Security Checklist above if your changes involve views, functions, triggers, or storage.
- Generate the migration →
supabase db pull <descriptive-name> --local --yes
- Verify →
supabase migration list --local
Reference Guides
- Skill Feedback → references/skill-feedback.md
MUST read when the user reports that this skill gave incorrect guidance or is missing information.