Appwrite Security Audit - Find Public Collections Free avatar

Appwrite Security Audit - Find Public Collections Free

Pricing

Pay per usage

Go to Apify Store
Appwrite Security Audit - Find Public Collections Free

Appwrite Security Audit - Find Public Collections Free

Audit any Appwrite project (cloud or self-hosted) for collections with over-permissive document-level permissions, public reads, and anonymous writes. Active anon fetch confirms live leaks. HTML report with paste-ready fix snippets. Free.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

Renzo Madueno

Renzo Madueno

Maintained by Community

Actor stats

0

Bookmarked

1

Total users

0

Monthly active users

2 minutes ago

Last modified

Categories

Share

Appwrite Security Auditor

If any of your Appwrite collections has the any role on read or list, anyone in the world can dump every document without auth right now. This actor finds those leaks in 30 seconds and tells you exactly which permissions to revoke.

Scan any Appwrite project for over-permissive collection/document permissions. Get a shareable HTML report. Active probe fetches data anonymously to PROVE leaks live, not just infer them.

Why this exists

Appwrite has a powerful permission model that's easy to leave too open. Three patterns I see over and over in production:

  • any role on read or list — the collection is fully public. Anyone can dump every document without auth.
  • users role too broadly — any signed-up user (including a self-registered anonymous one) reads or writes the entire collection.
  • Document Security disabled — collection-level perms apply to ALL documents. A single broad rule exposes everything.

This actor surfaces all of them across every database/collection in your project in one click.

What it checks

#CheckSeverity
1Permission grants any roleCRITICAL
2Permission grants users role too broadlyHIGH
3Document Security OFF on permission-protected collectionHIGH
4Team-based permission lacks role specificityMEDIUM
5OAuth2 misconfigMEDIUM
6Email auth without verificationMEDIUM

Output

  • HTML report (key REPORT) — self-contained Tailwind + Chart.js. Top banner shows X of N suspected leaks confirmed live. Every finding has a fix snippet.
  • Dataset — every finding as a row.
  • SUMMARY — counts + active-probe stats for monitoring pipelines.

How to get an API key

  1. Open your Appwrite console → Project Settings → API Keys → "Create API Key"
  2. Required scopes: databases.read, collections.read, projects.read
  3. Copy the key immediately (Appwrite shows it only once)

The key is used only for this run. Never persisted.

Apply fixes

This actor never modifies your Appwrite project. Each finding ships with a fix snippet you paste back into the Appwrite admin console.

For an agent loop (audit + preview inside Claude Code / Cursor / Cline) see the sibling MCP server: https://github.com/Perufitlife/appwrite-security-mcp

Want a written report + Q&A support?

Free actor → you find leaks. $29 lite tier (top 3 critical fixes + written summary) or $99 full audit (every collection's permissions + 30-day Q&A + paste-ready bundle, 24h delivery). The CTA links inside the HTML report take you to Stripe.

License + source

MIT. Open source: https://github.com/Perufitlife/appwrite-security-skill

Sister auditors (same family)