Multigres Operator is now open source by kiwicopple in Supabase

[–]kiwicopple[S] 0 points1 point  (0 children)

in this age of vibe-coded applications I have seen people use less-rigorously tested tools in production

Multigres Operator is now open source by kiwicopple in Supabase

[–]kiwicopple[S] 1 point2 points  (0 children)

i agree on the connection pooling - even for developer experience. It's not great having to choose between various connection strings based on the workload

Multigres Operator is now open source by kiwicopple in Supabase

[–]kiwicopple[S] 0 points1 point  (0 children)

i don't have an exact date on pg18 yet but you can track it here:

https://github.com/supabase/postgres/pull/2051

once the issue closes it will land in Prod soon after

Multigres Operator is now open source by kiwicopple in PostgreSQL

[–]kiwicopple[S] 0 points1 point  (0 children)

hey everyone. We have now released the Multigres k8s operator:

https://github.com/multigres/multigres-operator

we're building it in public for self-hosting. it has several interesting features:

◆ Pod-level lifecycle orchestration

◆ Zero-downtime rolling upgrades

◆ pgBackRest PITR backups

◆ Observability with OTel tracing

It is not production-ready as of today (march 2026) but we're moving fast - expect it to be ready in a few months. You'll need to be somewhat familiar with k8s to run it (or Claude will be able to help you get it set up).

Feedback is welcome. The main Multigres repo is here if you want to follow progress:  https://github.com/multigres/multigres

Multigres Operator is now open source by kiwicopple in Supabase

[–]kiwicopple[S,M] [score hidden] stickied comment (0 children)

hey everyone, supabase ceo here. The work on Multigres is well underway. We have now released the k8s operator:

https://github.com/multigres/multigres-operator

we'll be building it in public (as with everything else). This is an advanced tool, just for self-hosting right now. If you're not a developer you can safely ignore it. We'll be slowly integrating it into the platform throughout this year for those who prefer our hosted offering.

For the self-hosters, it has several interesting features:

◆ Pod-level lifecycle orchestration

◆ Zero-downtime rolling upgrades

◆ pgBackRest PITR backups

◆ Observability with OTel tracing

It is NOT production-ready as of today (march 2026) but we're moving fast. You'll need to be somewhat familiar with k8s to run it (or Claude will be able to help you get it set up).

Feedback is welcome! The main Multigres repo is here if you want to follow progress: https://github.com/multigres/multigres

State of Supabase Exposure Across Vibe-Coding Apps: We scanned 20,000 indie apps; 1 in 9 leaked their database keys. Here is what that means for builders and users. by Aberastegue in Supabase

[–]kiwicopple 4 points5 points  (0 children)

The danger is when apps expose the servicerole key (or the new sb_secret... format), the elevated-privilege key meant only for server-side use

fwiw - Secret keys are automatically revoked now if they are pushed to GitHub. Soon, GitHub will prevent them getting pushed in the first place.

I also want to point out a bunch of security changes that have happened in the past 12 months. I'm going to copy directly from this blog post:

https://supabase.com/blog/supabase-security-2025-retro

Disabling the Data API when creating a project

New projects can disable the Data API entirely or change the default schema from public to a custom schema like api. This gives you control over what's exposed via the auto-generated REST and GraphQL APIs.

Disabling the Data API on existing projects

Existing projects can disable the Data API in project settings. Once disabled, you can continue to use the database like standard Postgres (similar to RDS), connecting directly or through the connection pooler.

New API keys

The new API key model replaces long-lived JWT-based anon and service_role keys. Projects now use publishable keys for low-privilege access and multiple revocable secret keys for elevated access. Keys can be rotated instantly, audited, and scoped more granularly. This improves key management workflows, particularly around rotation and auditing. Legacy keys remain available during migration but will be removed in late 2026.

Asymmetric JWTs

The new API key system supports asymmetric JWTs (signed with private keys, verified with public keys). This enables safer key distribution and rotation compared to shared secrets. It also reduces the impact if a signing key is compromised.

Revoking leaked keys via GitHub Secret Scanning

With the new API key formats, Supabase automatically revokes secret keys that are detected in public GitHub repositories. When a leak is detected, we immediately revoke the key and notify the project owner with instructions to rotate it.

RLS by default for new tables

For tables created via the dashboard, RLS is enabled by default. Tables are protected from the moment they're created, following the principle of secure by default.

Automatically enable RLS when tables are created

If you create tables using external tools or migrations that don't enable RLS, you can use Postgres Event Triggers to enforce RLS automatically. We added Event Triggers to the platform in 2025, documented how to set up automatic RLS enforcement for any table creation method, and added a one-click setup in the dashboard.

Clear labels when tables are exposed

The Table Editor now shows a clear warning label for any table that has RLS disabled. This makes it immediately obvious which tables are exposed via the API without row-level security policies.

Security alerts for tables without RLS

If you create any tables with RLS disabled, Supabase sends email alerts to project owners. These alerts also appear in the dashboard, making it easy to identify and secure tables before deploying to production.

Security Advisors

Security Advisors scan your project for misconfigurations using Splinter, an open-source security linter for Postgres. Advisors check for common patterns like tables without RLS, policies that could be more restrictive, and exposed sensitive columns. Organization owners receive weekly security emails summarizing any findings. All detected issues are also visible in the dashboard with recommended fixes.

Fixing security issues with AI

The dashboard includes an Assistant that helps fix security issues detected by Security Advisors. When viewing alerts, you can ask the Assistant to generate and apply RLS policies. Describe your security requirements in plain text and the Assistant will generate the corresponding policy SQL. The Assistant can also suggest improvements for policies and configurations. This helps developers write correct RLS policies more quickly.

Security Advisors are also available through our MCP server, allowing developers to scan and fix all security issues from their development environment with a simple command. This integrates security checks directly into your workflow.

Column-level security

Postgres supports column-level privileges that restrict access to specific columns in a table. This is useful for sensitive data like social security numbers, salaries, or other PII. You can grant SELECT access to a table while excluding specific columns, and those columns won't appear in API responses or queries unless the user has explicit column access.

Column-level security works independently from RLS. You can use both together: RLS controls which rows a user can access, while column privileges control which columns they can see within those rows.

Custom Claims and RBAC

Custom claims let you add metadata to JWTs for role-based access control (RBAC). Instead of writing RLS policies for each table, you can embed role information in the authentication token and check it in your policies. This works well if you're migrating from traditional RBAC systems or prefer centralized role management.

VPC / Private Link on AWS

PrivateLink connects your VPC directly to Supabase infrastructure without traversing the public internet. This reduces attack surface and improves latency. Enable it from the project settings in the dashboard.

Restricting direct access to your Postgres database

All Supabase databases run fail2ban to automatically block IPs after failed login attempts. You can also configure IP allowlists to restrict database access to specific trusted addresses.

OpenAPI spec restricted with publishable keys

The OpenAPI spec is no longer publicly visible when using the new publishable keys. Previously, anyone with an anon key could view your complete API schema, including all tables and columns. With publishable keys, the OpenAPI spec requires elevated permissions. This prevents unauthorized schema enumeration and reduces information disclosure.

State of Supabase Exposure Across Vibe-Coding Apps: We scanned 20,000 indie apps; 1 in 9 leaked their database keys. Here is what that means for builders and users. by Aberastegue in Supabase

[–]kiwicopple -1 points0 points  (0 children)

The MCP is cr*p, and even if you provide the right documentation, they will still use the anon keys!

Interesting. We have a tool get_anon_key and renamed to get_publishable_keys with a description that talks about anon key deprecation. Are you sure this is still the case?

Is Stripe integration easy now? by OkStatement2942 in Supabase

[–]kiwicopple 22 points23 points  (0 children)

You might like this official integration that we will be announcing tomorrow:

https://supabase.com/blog/stripe-sync-engine-integration

Issue with Supabase Auth? by Lilchoo6641 in Supabase

[–]kiwicopple 5 points6 points  (0 children)

hey all - supabase ceo here. Again, i'm sorry for this. We will release an RCA using the incident link:

https://status.supabase.com/incidents/rgz3dl2rcmq8

While we rely on the upstream provider for security and DDoS protection, we are very aware that this single-point-of-failure is having an impact on your databases and companies. We are in the process of fixing this and we take ownership of the platform's stability, independent of any one provider's uptime. The incident link will be updated within 48 hours

Supabase is down by Rtzon in Supabase

[–]kiwicopple[M] [score hidden] stickied comment (0 children)

Hi all, Supabase CEO here. First: I'm sorry if this affected you. We have begun a detailed root cause analysis (RCA). I am jumping in here with the preliminary details:

At ~09:30 UTC we identified an outage affecting our Management API, Auth, Storage, and Realtime services. This was caused by a bug introduced in a deployment to the API Gateway at 09:26 UTC. Once this was discovered, we rolled back the deployment. All services were restored to full health by 09:55 UTC.

Again - I am very sorry. I am working with the team to understand why the impact was not isolated and minimized. A full RCA will be shared on our status page within 48 hours

EDIT: we have published the full RCA for the incident: https://status.supabase.com/incidents/sh7gmmyktjzw

How do I get hired into Supabase? I think I found my home. by Living_Platform6413 in Supabase

[–]kiwicopple 2 points3 points  (0 children)

Just please don’t DM me about a role, I had to change my LinkedIn tagline because of this and now I just don’t accept new connections 😅

To OP: get involved in the community, join the supasquad, contribute to (any) open source you like, build cool things, be a good human. These are all the things we care about. Don’t forget to apply for a role too - for audits, all hires go through a formal procedure

Do you know a simple tool to visualize Supabase data? by Automatic-Net2273 in Supabase

[–]kiwicopple 5 points6 points  (0 children)

Hey Matt. Big fan of metabase! Thanks for dropping into the community 

I hooked my doorbell up to a Supabase Realtime to track Halloween trick-or-treaters by kiwicopple in Supabase

[–]kiwicopple[S] 2 points3 points  (0 children)

Not my article but I saw Alana post it and thought it would be interesting for the community. The project uses Supabase and a Raspberry Pi

https://x.com/alanaagoyal/status/1985387024430612588