All activity
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Stojan Dimitrovski
left a comment
If you're not building apps with Supabase -- what are you doing?
If not using Supabase you are most likely:
- Wasting time and money on building "backends."
- Creating an Auth system -- again -- from scratch.
- Using a database that promises "scale" but doesn't deliver, asks for a ton of money and makes your developers feel sick.
So, in the end, just use Supabase -- and it really is just...
![Supabase](https://ph-files.imgix.net/ce7a4c38-9757-4286-8a54-7f074653f4db.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Supabase
The Postgres developer platform is now generally available
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Stojan Dimitrovski
left a comment
There's so much security spam out there. It's draining valuable time from engineering and security teams who are constantly vetting low-quality submissions by bounty hunters. Often submissions are hard to understand, out-of-scope as outlined in the security.txt document or just plain fabricated. Sometimes the urgency with which some of these submissions are voiced can expose teams and companies...
![vuln:vet](https://ph-files.imgix.net/2b355dd8-6975-4cf6-9034-821be4764644.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
vuln:vet
Tired of bounty hunters? Vet claims of vulnerability with AI
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Security spam is everywhere. Researchers asking for bounties before they disclose supposed serious vulnerabilities. vuln:vet uses sophisticated AI and other spam fighting technology to help startups manage vulnerability messages.
![vuln:vet](https://ph-files.imgix.net/2b355dd8-6975-4cf6-9034-821be4764644.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
vuln:vet
Tired of bounty hunters? Vet claims of vulnerability with AI
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
![Stojan Dimitrovski](https://ph-avatars.imgix.net/41968/d60f7ac8-906c-4b63-b3e6-5cc06aa560e8.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Supadebug provides explanations into client errors from the Supabase JS library, along with providing suggested solutions - all while within your browser console. You'll also be provided links to the exact page on the Supabase docs relevant the error.
![Supadebug](https://ph-files.imgix.net/8e693d47-f189-438b-b21b-994198a524a9.png?auto=compress&codec=mozjpeg&cs=strip&auto=format&w=48&h=48&fit=crop&frame=1)
Supadebug
Get solutions for your Supabase errors within the console.