Security . 17 Apr 2025 . By Nessa

How hacked lovable.dev Sites?

AI website builders are fast, cheap, and easy. But are they secure? Apparently not. A Palantir engineer hacked into “top launched” sites built on lovable.dev in just 47 minutes — gaining access to personal data, admin API keys, and sensitive AI prompts.


What Happened?

Danial Asaria — engineer at Palantir — published a post on X, claiming he hacked several websites generated with lovable.dev in under an hour. Not as a hacker, but as a “curious dev” with just 15 lines of Python.

He accessed:

- Users' personal debt information and home addresses:

- Admin-level API keys:

- Private AI prompts:


"Let’s be honest — it comes with vulnerabilities".


What is Lovable.dev?

Lovable is an AI-powered site builder. You simply describe what you want, and the platform generates a fully functional website within minutes. It’s a dream for startups, creators, and “web vibers” who don’t want to deal with backends, databases, or authentication flows.

But that convenience comes at a cost.


Technical Details of the Exploit

As detailed in investigation, lovable.dev-generated websites had multiple critical flaws:

1. No Authentication on Admin Panels

Many sites allowed direct access to /admin or /dashboard pages — without any authentication.

Impact: Danial could open these pages directly and view:

- User data.

- Financial info.

- AI prompt editing interfaces.

2. Hardcoded API Keys

AI prompts were stored with embedded API keys — exposed in plain text within frontend-rendered JSON data.

3. No Input Validation

Generated prompts accepted unfiltered user input — no sanitization or sandboxing. This created potential for prompt injection and even SSRF/LFI when external APIs were involved.

4. Frontend-Only "Security"

Most sites lacked a backend entirely. All logic and access control were handled in client-side JavaScript — easily bypassed using DevTools or Python scripts.


How Was It Done?

According to Danial, all he needed was 15 lines of Python to scan and extract data from top-listed lovable.dev sites:

- Collect site URLs from public “Top Launched” lists.

- Probe endpoints like /admin, /data, /api/keys, /prompts

- Parse exposed JSON responses for secrets, tokens, and user data.

- No brute force, no firewall evasion — just basic scraping.


What Went Wrong?

Experts outlined several fundamental security failures by lovable.dev’s design:

- No role-based access control (RBAC).

- No server-side request validation.

- Sensitive data exposed in client-side scripts.

- AI-generated components not reviewed or audited for security.


Bottom line: AI doesn't replace security. If you're automating site generation without audits or pentests, you're automating vulnerabilities too.


What Happens Now?

Lovable.dev has promised to revise its architecture. But this incident is a wake-up call for the whole industry — especially anyone using no-code/low-code AI tools.

- Always perform a security audit — even on “simple” tools.

- Don’t blindly trust “websites built in 5 minutes”.

- Remember: a prompt is still code — and code can be exploited.


“This isn’t a breach. It’s a wake-up call.”


Final Thought

AI site builders are the future. But they must be secure by design. Until then — don’t trust your data to “vibe coders” who’ve never read the OWASP Top 10.


Stay ahead, stay secure.


Don’t just keep up with trends — be prepared for them! 

Test our platform: https://a42.tech/