supabase-best-practices
Original:🇺🇸 English
Translated
Supabase security and performance guidelines with Clerk authentication integration. Contains 40+ rules across 10 categories covering RLS policies, Clerk setup, database security, and more.
9installs
Added on
NPX Install
npx skill4agent add pedrobarretocw/supabase-best-practices supabase-best-practicesTags
Translated version includes tags in frontmatterSKILL.md Content
View Translation Comparison →Supabase Best Practices
Comprehensive security and performance optimization guide for Supabase applications with Clerk authentication integration. Contains 40+ rules across 10 categories, prioritized by impact to guide secure development and code review.
When to Apply
Reference these guidelines when:
- Setting up a new Supabase project
- Integrating Clerk authentication with Supabase
- Writing Row Level Security (RLS) policies
- Designing database schemas
- Implementing real-time features
- Configuring Storage buckets
- Writing Edge Functions
- Reviewing code for security issues
Rule Categories by Priority
| Priority | Category | Impact | Prefix |
|---|---|---|---|
| 1 | Row Level Security | CRITICAL | |
| 2 | Clerk Integration | CRITICAL | |
| 3 | Database Security | HIGH | |
| 4 | Authentication Patterns | HIGH | |
| 5 | API Security | HIGH | |
| 6 | Storage Security | MEDIUM-HIGH | |
| 7 | Realtime Security | MEDIUM | |
| 8 | Edge Functions | MEDIUM | |
| 9 | Testing | MEDIUM | |
| 10 | Security | MEDIUM | |
Quick Reference
1. Row Level Security (CRITICAL)
- - Always enable RLS on public schema tables
rls-always-enable - - Wrap auth functions with (SELECT ...) for performance
rls-wrap-functions-select - - Add indexes on columns used in RLS policies
rls-add-indexes - - Specify roles with TO authenticated clause
rls-specify-roles - - Use SECURITY DEFINER functions for complex policies
rls-security-definer - - Minimize joins in RLS policies
rls-minimize-joins - - Use explicit auth.uid() checks
rls-explicit-auth-check - - Use RESTRICTIVE policies for additional constraints
rls-restrictive-policies
2. Clerk Integration (CRITICAL)
- - Use Third-Party Auth integration (not JWT templates)
clerk-setup-third-party - - Use accessToken callback for server-side clients
clerk-client-server-side - - Use useSession() hook for client-side clients
clerk-client-client-side - - Configure role: authenticated claim in Clerk
clerk-role-claim - - Use organization claims for multi-tenant RLS
clerk-org-policies - - Enforce MFA with RESTRICTIVE policies
clerk-mfa-policies - - Never use deprecated JWT template integration
clerk-no-jwt-templates
3. Database Security (HIGH)
- - Use versioned migrations for schema changes
db-migrations-versioned - - Follow proper schema design patterns
db-schema-design - - Implement proper indexing strategy
db-indexes-strategy - - Always use foreign key constraints
db-foreign-keys - - Secure trigger functions properly
db-triggers-security - - Use SECURITY INVOKER for views
db-views-security-invoker
4. Authentication Patterns (HIGH)
- - Always validate JWT claims
auth-jwt-claims-validation - - Treat user_metadata as untrusted
auth-user-metadata-safety - - Use app_metadata for authorization
auth-app-metadata-authorization - - Implement proper session management
auth-session-management
5. API Security (HIGH)
- - Always filter queries even with RLS
api-filter-queries - - Use publishable keys correctly
api-publishable-keys - - Never expose service role key to client
api-service-role-server-only
6. Storage Security (MEDIUM-HIGH)
- - Enable RLS on storage.objects
storage-rls-policies - - Configure bucket-level security
storage-bucket-security - - Use signed URLs for private files
storage-signed-urls
7. Realtime Security (MEDIUM)
- - Use private channels for sensitive data
realtime-private-channels - - RLS policies apply to realtime
realtime-rls-authorization - - Clean up subscriptions on unmount
realtime-cleanup-subscriptions
8. Edge Functions (MEDIUM)
- - Always verify JWT in edge functions
edge-verify-jwt - - Handle CORS properly
edge-cors-handling - - Use secrets for sensitive data
edge-secrets-management
9. Testing (MEDIUM)
- - Test RLS policies with pgTAP
test-pgtap-rls - - Isolate tests properly
test-isolation - - Use test helper functions
test-helpers
10. Security (MEDIUM)
- - Validate all inputs before processing
security-validate-inputs - - Regularly run Security Advisor checks
security-audit-advisors
How to Use
Read individual rule files for detailed explanations and code examples:
references/rules/rls-always-enable.md
references/rules/clerk-setup-third-party.md
references/rules/_sections.mdEach rule file contains:
- Brief explanation of why it matters
- Incorrect code example with explanation
- Correct code example with explanation
- When NOT to use the pattern
- Reference links to official documentation
Full Compiled Document
For the complete guide with all rules expanded:
references/supabase-guidelines.md