top of page

Application security: a complete guide

  • Writer: Sharon Hafuta
    Sharon Hafuta
  • 3 days ago
  • 11 min read

Updated: 1 day ago

Ready to see what Base44 can do for you? Get started →


application security
Tomer Cohen is the VP of product at Mobb. He's an experienced Product Manager & Security Researcher. And an expert in building and securing tech products, B2C and B2B, from incubation to large scale deployments.

This guide empowers vibe coders of all skill levels to understand security fundamentals and secure their applications from day one. Whether you're building your first landing page or launching a commercial product, these principles will help you create secure, trustworthy applications.


Vibe Coding is revolutionizing software development by democratizing the app building process—enabling anyone to transform ideas into live applications without traditional coding barriers. As more creators embrace this paradigm, security becomes not just important, but essential.


Try vibe coding out for yourself. Learn how to build an app with AI and see how the best ai app builders can bring your ideas to life.



so what are we building with base44?


App security 101


Whether you're launching your first app or hardening an existing product, this guide provides actionable steps to build secure, trustworthy applications that protect your users' data. Here’s what this guide includes:



Security workflow and tools


  • When to start thinking about security (and why timing matters)

  • How to use Base44's built-in security check to identify vulnerabilities

  • Leveraging SafeVibes for external security scanning

  • The iterative security hardening loop for continuous protection



Core security concepts


  • App visibility settings and the principle of least privilege

  • Authentication and password management best practices

  • Role-Based Access Control (RBAC) for permission management

  • Row Level Security (RLS) for controlling data access

  • Field Level Security (FLS) for granular permissions on mixed data



Real-world examples


  • Securing a landing page with contact form

  • Protecting an e-commerce product catalog

  • Implementing user-specific data isolation in finance apps

  • Managing mixed public/private data



Advanced protection


  • Backend functions for hiding sensitive logic and code

  • Secrets management for API keys and credentials

  • Server-side validation and rate limiting



Practical resources


  • Pre-launch security checklist

  • Common mistakes to avoid

  • When to seek expert help

  • Next steps for ongoing security



When app security becomes critical


Many app builders begin with experimentation—playing with ideas, testing concepts, and iterating rapidly. During this exploratory phase, security may not be your primary concern. However, recognizing when you transition from prototype to production is crucial for implementing security at the right time.


You must prioritize app security when any of these conditions apply:



Real users are active on your app


  • Your app has moved beyond personal testing

  • Others are depending on your application's availability and reliability

  • User trust becomes a factor in your app's success



Private or sensitive data is stored by your app


  • Personally Identifiable Information (PII): names, addresses, phone numbers, emails

  • Financial data: payment methods, transaction history, account balances

  • Business-sensitive information: proprietary content, internal communications

  • Any data that shouldn't be publicly accessible



Why security-first?


Start early, save time. Retrofitting security into an existing application is exponentially more difficult than building it in from the beginning. 


Think of security like building foundations—much easier to get right at the start than to fix later.



application security guide - why app security matters


App security getting started




01. Base44 built-In security check


Base44's integrated security scanner serves as your first line of defense, identifying common vulnerabilities before they become serious problems.



application security 101 - base44 security check feature


What it detects:


  • Exposed sensitive data

  • Leaked API keys and secrets

  • Misconfigured access controls

  • Common security anti-patterns


How to use it:


  • Access the security check from your Base44 dashboard

  • Review flagged issues with contextual explanations

  • Apply suggested fixes with one-click remediation where available



app security guide, base44 app security built in


02. SafeVibes external security scanner


SafeVibes.ai provides an external perspective on your application's security posture, showing exactly what data is accessible to anonymous users on the internet.


Key capabilities:


  • External vulnerability scanning

  • Data exposure mapping

  • Real-time security posture assessment

  • Clear severity ratings for discovered issues


How to use it:


  1. Navigate to safevibes.ai

  2. Enter your application's URL

  3. Review the exposure report

  4. Identify which data shouldn't be public

  5. Use the findings to guide your security configuration



03. The security hardening loop


Follow this iterative process to systematically secure your application:


  • Initial scan: Run SafeVibes to establish baseline security posture

  • Internal check: Execute Base44's built-in security check

  • Apply fixes: Implement suggested remediations

  • Verify: Re-scan with SafeVibes to confirm issues are resolved

  • Manual review: For remaining exposures, manually configure security settings or consult an expert


Pro tip: As your product evolves, run security scans regularly (weekly or monthly) to catch new vulnerabilities introduced by changes or updates.



App security best practices




01. App visibility, your first security layer


Base44's app visibility settings control who can access your application at the broadest level. This is your first and most fundamental security decision.



Always default to the most restrictive setting that allows your app to function. You can always expand access later but you can't un-expose data that's already been leaked.



Visibility Levels


Private

  • Only visible to you and explicitly invited users

  • Best for: Internal tools, admin dashboards, development/staging environments

  • Security benefit: Smallest attack surface, controlled user base


Public with login required

  • Anyone can discover your app, but must authenticate to use it

  • Best for: SaaS applications, member portals, social platforms

  • Security benefit: User accountability, controlled access to features


Public without login

  • Fully accessible to anyone on the internet

  • Best for: Marketing sites, public content, e-commerce storefronts

  • Security benefit: Maximum reach (but requires careful data protection)


Decision framework:

  • Who is your intended audience?

  • Does your app handle user-specific data?

  • Do you need to track who does what?

  • Is there value in keeping the app discoverable to search engines?


Read the full guide to documentation management.



02. Authentication and Password Management


Built-In authentication


Base44 handles authentication and password security automatically, implementing industry best practices:


  • Secure password hashing

  • Protection against common attacks

  • Session management

  • Password reset flows



app security guide -authentication management in base44


Critical tip: Never build your own authentication system. 


Custom login mechanisms frequently contain security vulnerabilities. Use Base44's built-in authentication instead.



Role-based access Control (RBAC)


For administrative access or permission tiers, use Base44's roles feature:


  • Assign roles to users (e.g., admin, user)

  • Reference roles in RLS/FLS rules

  • Manage role assignments through the dashboard


Anti-pattern to avoid: Creating custom "admin password" fields or building your own role system. These approaches bypass Base44's security features and introduce vulnerabilities.


Read the complete guide to access management.



03. Data access control: RLS and FLS


Understanding Base44's data model


In Base44, your application data is organized in tables—similar to spreadsheets. Each table represents one type of entity (users, products, orders) with fields (columns) storing specific attributes (name, price, status).


Every table has granular security settings that control data access at multiple levels.



Row Level Security (RLS)


RLS controls access to entire records (rows) in a table. You configure four distinct permission types:


READ: Who can view existing records

  • Controls data visibility

  • Affects API queries, list views, detail pages

  • Example: "Only show users their own orders"


WRITE: Who can create new records

  • Controls data insertion

  • Affects form submissions, API POST requests

  • Example: "Anyone can submit a contact form"


UPDATE: Who can modify existing records

  • Controls data changes

  • Affects edit forms, API PATCH/PUT requests

  • Example: "Users can only edit their own profile"


DELETE: Who can remove records

  • Controls data deletion

  • Affects delete actions, API DELETE requests

  • Example: "Only admins can delete products"



Field Level Security (FLS)


FLS provides even finer control by setting permissions on individual fields within a table. This is essential when a table contains both public and private data.


Use cases for FLS:

  • Showing product names publicly but keeping inventory counts private

  • Displaying user names but hiding email addresses


How it works:

  1. Set restrictive RLS defaults for the entire table

  2. Add FLS rules for specific fields that need different permissions

  3. FLS settings override RLS for those specific fields




Application security in action (with practical examples)


Let's explore real-world scenarios with complete security configurations.



Example 1: Landing page with contact form


The scenario


You're creating a landing page for your business with a contact form collecting visitor information (names, emails, phone numbers).


Base44 prompt

"Create a landing page with a contact form"


Initial state (Insecure)


  • App Visibility: Public without login (correct)

  • Contact table: Fully accessible (WRONG!)


By default, anyone can read all submitted contact information—a serious privacy violation.


SafeVibes detection


Running the app through SafeVibes reveals:

  • Contact form data exposed to anonymous users

  • High severity: PII accessible without authentication

  • Recommendation: Implement access controls


Security configuration


App Visibility: Public without login

  • Visitors must be able to access the form without barriers


Contact Table RLS:

READ: Admin only

  Rationale: Only you should see contact submissions


WRITE: No restrictions

  Rationale: Anyone can submit the form


UPDATE: Admin only

  Rationale: Only you should modify submissions


DELETE: Admin only

  Rationale: Only you should remove submissions


Verification

Re-scan with SafeVibes to confirm the data is no longer exposed.



Example 2: E-commerce store


The scenario


An online store where you manage a product catalog and customers can browse and purchase items.


Base44 Prompt

"Create a t-shirt shop website"


Initial considerations

  • Products should be publicly viewable

  • Only admins should manage inventory

  • Optional: Add login for order history and customer accounts


Security configuration


App Visibility: Public without login

  • Customers browse without creating accounts

  • (Optional: Add "Public with login" if enabling customer accounts)


Products Table RLS:

READ: No restrictions

  Rationale: Products are meant to be public


WRITE: Admin only

  Rationale: Only store owners add products


UPDATE: Admin only

  Rationale: Only store owners modify prices/details


DELETE: Admin only

  Rationale: Only store owners remove products


Orders Table RLS (if implemented):

READ: Creator only or Admin

  Rationale: Users see their orders, admins see all


WRITE: Creator only

  Rationale: Users can create only their own records, when they place orders


UPDATE: Admin only

  Rationale: Users can't modify orders after placement


DELETE: Admin only

  Rationale: Order history should be preserved


Additional considerations

  • Product inventory counts might need FLS (public visibility but admin-only updates)

  • Pricing should be read-only for customers

  • Consider hiding out-of-stock items vs. showing them as unavailable



Example 3: Personal finance app


The scenario


A wallet application where users manage their bank account information—highly sensitive personal data.


Base44 Prompt

"Create a wallet app where users can add and manage their bank accounts info"


Security requirements


  • Each user sees only their own data

  • No data sharing between users

  • Strong authentication required



Security configuration


App Visibility: Public with login required

  • Could be private if targeting specific users

  • Authentication is mandatory


BankAccounts Table RLS:

READ: Creator only

  Rationale: Users see only their accounts


WRITE: Creator only

  Rationale: Users add only their accounts


UPDATE: Creator only

  Rationale: Users modify only their accounts


DELETE: Creator only

  Rationale: Users remove only their accounts


This "Creator Only" pattern is perfect for user-specific data and is a built-in Base44 configuration.


Additional security measures


  • Consider using backend functions (see Advanced Features) for sensitive operations

  • Implement activity logs for audit trails

  • Add multi-factor authentication for sensitive actions



Example 4: Public petition with mixed data


The scenario


A petition where people sign with their name and email. Names are displayed publicly to show support, but emails remain private.


Base44 prompt

"Create a public petition page where visitors can sign with their name & email. Expose only the names of the signers on the main page"


The challenge


One table (Signatures) contains both public data (names) and private data (emails). RLS alone can't differentiate between fields.


Security configuration


App visibility: Public without login


Signatures Table RLS (Restrictive baseline):

READ: Admin only

  Rationale: Default to private


WRITE: No restrictions

  Rationale: Anyone can sign


UPDATE: Admin only

  Rationale: Prevent signature modification


DELETE: Admin only

  Rationale: Preserve petition integrity


Name Field FLS (Override for public visibility):

READ: No restrictions

  Rationale: Names should be public


WRITE: No restrictions

  Rationale: Inherited from table


UPDATE: Admin only

  Rationale: Prevent name changes


DELETE: Admin only

  Rationale: Inherited from table


Email Field FLS (Remains private):

Uses table-level RLS settings—Admin only access


FLS overrides table-level RLS for specific fields, enabling granular control over mixed public/private data in a single table.



App security: advanced features



Backend functions: protecting code and secrets



Understanding client-side limitations


Base44 apps, for example, run primarily in the browser (client-side), which means:


  • All client-side code is visible to users

  • Anyone can inspect network requests

  • JavaScript can be read and modified

  • Data in the browser can be extracted



When backend functions are essential


Sensitive logic

  • Admin-only operations that shouldn't be visible

  • Business logic you want to protect

  • Calculations involving proprietary algorithms


API keys and credentials

  • Third-party service keys (Stripe, SendGrid, Google APIs)

  • Database connection strings

  • OAuth client secrets


AI prompts and instructions

  • Custom prompts you've refined

  • Domain-specific instructions

  • Proprietary AI configurations


Rate limiting and validation

  • Server-side validation that can't be bypassed

  • Request throttling

  • Complex authorization checks



How backend functions work


Backend functions execute on Base44's servers, not in the user's browser:


  1. Client-side code calls the backend function

  2. Request is sent to Base44's secure server

  3. Function executes with access to secrets

  4. Result is returned to the client


Code in backend functions is never exposed to users.



Secrets management


While backend functions hide code, Secrets provide an additional security layer for highly sensitive values.


Benefits of secrets management


Separation of concerns

  • Secrets stored separately from code

  • No secrets in version control

  • Easy rotation without code changes


Enhanced security

  • Encrypted at rest

  • Access logging

  • Restricted access even within your team


Environment management

  • Different secrets for development vs. production

  • Safe testing without exposing production credentials



What to store as secrets


  • API keys for third-party services

  • Database credentials

  • Encryption keys

  • OAuth client secrets

  • Webhook signing secrets

  • Payment processor credentials


Best practices for secrets management


  1. Never hardcode secrets in your application code

  2. Rotate regularly: Change secrets periodically

  3. Use least privilege: Grant minimal necessary permissions

  4. Monitor access: Review secret usage logs

  5. Separate environments: Different secrets for dev/staging/prod



Application security checklist


Use this checklist before launching your app:


Pre-launch security audit


App configuration

  • [ ] App visibility set to appropriate level

  • [ ] Authentication required if handling user data

  • [ ] Roles configured for admin access


Data security

  • [ ] RLS configured for every table

  • [ ] FLS applied to fields with different access needs

  • [ ] "Creator only" used for user-specific data

  • [ ] Admin-only access for management tables


External validation

  • [ ] Base44 security check run and issues resolved

  • [ ] SafeVibes scan completed with no unexpected findings

  • [ ] Manual review of any remaining issues


Sensitive data

  • [ ] No PII exposed publicly

  • [ ] No financial data accessible without authentication

  • [ ] No internal business data visible to customers


Code security

  • [ ] API keys moved to backend functions

  • [ ] Secrets stored in Secrets management

  • [ ] No authentication logic in client-side code

  • [ ] No sensitive business logic visible in browser


Testing

  • [ ] Tested app as anonymous user (logged out)

  • [ ] Verified users can't access others' data

  • [ ] Confirmed admin-only features are restricted

  • [ ] Checked for data exposure via API endpoints



Common app security mistakes to avoid



01. Security later mentality


Mistake: Building the entire app before thinking about security

Impact: Massive refactoring, potential data exposure, delayed launch

Solution: Plan security from day one, even during prototyping



02. Overly permissive defaults


Mistake: Setting everything to "No restrictions" to make it "work"

Impact: Complete data exposure, privacy violations

Solution: Start restrictive, selectively open access



03. Custom authentication


Mistake: Building your own login system

Impact: Security vulnerabilities, reinventing the wheel

Solution: Always use Base44's built-in authentication



04. Client-side secrets


Mistake: Including API keys in frontend code

Impact: Keys can be stolen and abused

Solution: Use backend functions and Secrets management



05. Ignoring scanner results


Mistake: Dismissing security warnings without understanding them

Impact: Known vulnerabilities remain exploitable

Solution: Investigate every finding, fix or document why it's safe



06. Mixed public/private without FLS


Mistake: Making entire tables public when only some fields should be

Impact: Unintentional PII exposure

Solution: Use FLS to control field-level access



07. No regular security reviews


Mistake: Only checking security at launch

Impact: New vulnerabilities go undetected

Solution: Schedule monthly security scans



App security: how to keep up to date


Here's how to keep up to date with application security:


  • Join the Base44 security community or report a security vulnerability

  • Follow security best practices blogs

  • Stay updated on common web vulnerabilities (OWASP Top 10)

  • Participate in security-focused vibe coding discussions



When to get expert help


  • Handling regulated data (healthcare, finance)

  • Building applications with legal compliance requirements

  • After a security incident or suspected breach

  • Before processing payments or sensitive transactions

  • When security scans reveal issues you don't understand



As vibe coding and AI-assisted development continue to transform how we build software, new security challenges emerge that require specialized expertise. Mobb is the leading expert in AI coding security, helping organizations safely adopt AI coding assistants while maintaining robust security standards. 


Mobb's platform provides comprehensive visibility into AI-generated code, automatically detects vulnerabilities specific to AI coding patterns, and offers intelligent remediation capabilities that work seamlessly with your development workflow. 

Whether you're building with Base44, using GitHub Copilot, or leveraging other AI coding tools, Mobb ensures your AI-generated code meets enterprise security standards.


Connect with our author Tomer Cohen here.





 
 
bottom of page