Admin users route may be exposed
app/api/admin/users/route.ts:12
GET returns user records before any session or admin-role check is visible.
Purpose-built for launch-risk reports. Designed for the era of agents, generated code, and founders shipping before their security model catches up.
Queue
app/api/admin/users/route.ts:12
GET returns user records before any session or admin-role check is visible.
app/api/stripe/webhook/route.ts:21
lib/projects.ts:44
Next action
Require a server-side session and admin-role check before returning user records. Add a logged-out and non-admin regression test before marking this fixed.
Auth, admin, payment, data, uploads, AI tools, and rate limits are treated as first-class risk surfaces.
Findings point to files, line numbers, confidence, and the concrete signal that triggered the rule.
Watch is scoped to new urgent issues and previous-scan comparison, not another dashboard to maintain.
A new species of app risk report
AbyssGuard turns a source snapshot into an ordered review of what can expose data, bypass payment, unlock admin access, or make the next change harder to trust.
Deterministic rules run before any AI explanation layer, so results are repeatable and cheap to verify.
App Risk, Code Health, and Test Confidence stay separate so messy code does not hide urgent safety issues.
Paid reports unlock repair prompts and verification steps that fit how founders actually work with AI coding tools.
1.0 Intake
Start with a public GitHub URL or a private OAuth snapshot. AbyssGuard reads bounded source files, runs deterministic checks, and keeps raw source out of durable report storage.
2.0 Review
Each full finding explains why it matters, what evidence was found, how confident the scanner is, and which verification steps prove the fix worked.
app/api/admin/users/route.ts
app/api/paddle/webhook/route.ts
lib/projects.ts
3.0 Repair
The report turns risky flows into constrained repair prompts: preserve response shapes, avoid broad refactors, add focused tests, and re-scan after changes.
Goal: fix Fix now issues first without broad refactors.
1. Add server-side auth before admin data access.
2. Verify webhook signatures before state changes.
3. Add focused tests for logged-out and forged-event cases.
After fixes: run tests, manually verify, then re-scan.
Pricing
Start with proof from a free preview, unlock a one-time report when the findings are useful, then monitor only after the app is worth watching.