supabase· 56 findings · 2 confirmed high · MODERATE RISK
Compliance Risk Analysis
supabase
https://github.com/supabase/supabase
Scanned 2026-03-23 · OpenDocket V1 · Primary: Claude Sonnet · Review: Gemini 2.5 Flash
Important Limitations of This Report
This report is not legal advice and is not defensible in court. It provides directional guidance only. To obtain a defensible compliance assessment, engage a licensed attorney and certified auditor.

Scope limitations: Only public repository content was analyzed. Infrastructure configuration, deployment settings, operational policies, vendor contracts, and staff training are outside scope.

A true compliance audit would also review: vendor contracts and BAAs, staff training records, incident response procedures, physical security controls, and system audit logs — none of which are visible in source code.
Risk Assessment

This analysis identified 56 compliance patterns across GDPR, HIPAA, PCI-DSS, SOC2, SOX, TCPA. After independent verification by Gemini 2.5 Flash, 2 high-severity findings were confirmed and 52 were identified as possible false positives — likely pattern matches in documentation or configuration files rather than application source code. The 2 confirmed findings represent the primary areas requiring attention.

MODERATE RISK
2 confirmed high-severity findings
47 total patterns identified · 52 flagged as possible false positives by independent review
What This Means If Unaddressed
FrameworkRegulatory BodyMax PenaltyEnforcement Trend
GDPR (9 high)EU DPAsUp to EUR 20M or 4% turnoverCross-border enforcement rising
TCPA (8 high)FCC$500-$1,500 per violationClass action filings at record levels
SOX (8 high)SEC / PCAOBCriminal penalties, delistingIT controls under increased scrutiny
SOC2 (8 high)AICPALoss of enterprise contractsMandatory for enterprise SaaS sales
PCI-DSS (7 high)PCI SSCFines $5K-$100K/monthv4.0 enforcement accelerating
HIPAA (7 high)HHS / OCRFines up to $1.5M/year per categoryIncreasing enforcement, record penalties in 2024
Top Findings
High RiskPCI-DSSPCIDSS-008apps/docs/app/api/revalidate/route.utils.ts:27 · Review: CONFIRMED
Implement a comprehensive cryptographic key management system that covers the full lifecycle: key generation using cryptographically secure methods, secure distribution mechanisms, encrypted storage w
High RiskTCPATCPA-006No specific file cited · Review: CONFIRMED
Implement a comprehensive consent management system that captures and stores all required TCPA consent elements in a structured database. This should include creating database schemas to store consent
High RiskGDPRGDPR-001.claude/skills/telemetry-standards/SKILL.md:61 · Review: POSSIBLE FALSE POSITIVE
Conduct a comprehensive data processing audit to identify all personal data processing activities (authentication, user profiles, analytics, AI interactions, etc.) and document the specific Article 6
Gemini Verification Layer
How to read this: The confirmed count is your action list. The false positive count shows where the scanner found keyword patterns in documentation rather than application source code. Click any finding to see exactly what evidence was found and why Gemini made its determination.
4Confirmed
0Context dependent
52Possible false positives
0Additional risk
Primary: Claude Sonnet (Anthropic). Verification: Gemini 2.5 Flash (Google). Neither constitutes legal advice.
Recommended Actions
High
Establish and document a comprehensive key management lifecycle for the `DOCS_REVALIDATION_OVERRIDE_KEYS` found in `apps/docs/app/api/revalidate/route.utils.ts`. This must include secure generation, distribution, storage, rotation, and destruction of these and any similar secrets, to ensure compliance with PCI DSS Requirements 3.6 and 3.7.
PCI-DSS · PCIDSS-008 · Confirmed
High
Design and integrate a robust consent management mechanism within Supabase's database schemas, ensuring records capture TCPA-required elements like date, time, method, and specific consent language presented to consumers; failure to do so risks significant regulatory penalties for non-compliant communication practices.
TCPA · TCPA-006 · Confirmed
Medium
Modify the `sendToLogflare` calls in `apps/docs/app/api/graphql/route.ts` and other relevant API endpoints to capture granular details for all access, creation, modification, and deletion of ePHI, including user and timestamp information. This specific logging enhancement is required to meet HIPAA's audit control standard for safeguarding electronic Protected Health Information.
HIPAA · HIPAA-006 · Confirmed
Medium
Modify the `input-otp` component referenced in `apps/design-system/__registry__/index.tsx` by ensuring it is fully integrated with a robust backend authentication service that enforces Multi-Factor Authentication for all user access, particularly for privileged accounts. This change is necessary to satisfy SOC2 CC6.1 requirements for logical access security.
SOC2 · SOC2-009 · Confirmed
Risk Scorecard
FrameworkHigh RiskConfirmedFalse Pos.MediumConcernNo Issue
GDPR9010010
HIPAA719111
PCI-DSS719201
SOC2819110
SOX808000
TCPA817000
Domains Detected
Saas
92.2%
Ecommerce
76.5%
Fintech
60.7%
Communication
46.0%
Healthcare
40.8%
Gdpr
16.7%
Sox
5.9%
Framework:
Severity:
GDPR
EU DPAs · Up to EUR 20M or 4% turnover
10 findings · 10 possible FP
Possible False Positives (10)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
HIPAA
HHS / OCR · Fines up to $1.5M/year per category
10 findings · 9 possible FP
HIPAA-006
Medium Risk
Regulatory Standard
Gemini Verification
CONFIRMED
Application source code (route.ts) directly uses a logging mechanism (`sendToLogflare`) within a repository explicitly linked to the healthcare domain, indicating an application-level function that must meet HIPAA audit control requirements for ePHI.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .gitignore:141 # For self-hosted logs: https://github.com/supabase/supabase/blob/86e3ab20abfdb9c3e666334d3d2f8efeef [SOURCE] apps/docs/app/api/graphql/route.test.ts:3 vi.mock('~/lib/logger', async () => { [SOURCE] apps/docs/app/api/graphql/route.test.ts:4 const actual = await vi.importActual<typeof import('~/lib/logger')>('~/lib/logger') [SOURCE] apps/docs/app/api/graphql/route.ts:16 import { LOGGING_CODES, sendToLogflare } from '~/lib/logger' [SOURCE] apps/docs/app/api/graphql/route.ts:257 sendToLogflare(LOGGING_CODES.CONTENT_API_REQUEST_RECEIVED, { [SOURCE] apps/docs/app/api/graphql/route.ts:16 import { LOGGING_CODES, sendToLogflare } from '~/lib/logger' [DOCS] apps/docs/components/AuthSmsProviderConfig/MessageBirdConfig.mdx:22 Start by logging into your MessageBird account and verify the mobile number you'll be using to test [DOCS] apps/docs/components/AuthSmsProviderConfig/TwilioConfig.mdx:57 Start by logging into your Twilio account and starting a new project: https://www.twilio.com/console
Finding
Does the system implement hardware, software, and procedural mechanisms that record and examine activity in information systems that contain or use electronic Protected Health Information, as required under the audit controls standard?
Remediation
Modify the `sendToLogflare` calls in `apps/docs/app/api/graphql/route.ts` and other relevant API endpoints to capture granular details for all access, creation, modification, and deletion of ePHI, including user and timestamp information. This specific logging enhancement is required to meet HIPAA's audit control standard for safeguarding electronic Protected Health Information.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
PCI-DSS
PCI SSC · Fines $5K-$100K/month
10 findings · 9 possible FP
PCIDSS-008
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The evidence shows usage of `DOCS_REVALIDATION_OVERRIDE_KEYS` from environment variables for authorization in a revalidation process. In a PCI DSS context, especially for domains like fintech and ecommerce, all such access tokens or 'keys' used in the system, even for documentation, must be subject to robust key management practices including generation, distribution, storage, rotation, and destruction, which are not evidenced in the provided source code snippets.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[SOURCE] apps/docs/app/api/revalidate/route.utils.ts:27 const overrideKeys = process.env.DOCS_REVALIDATION_OVERRIDE_KEYS?.split(/\s*,\s*/) ?? [] [SOURCE] apps/docs/app/api/revalidate/route.utils.ts:28 if (basicKeys.length === 0 && overrideKeys.length === 0) { [SOURCE] apps/docs/app/api/revalidate/route.utils.ts:37 if (overrideKeys.includes(token)) { [SOURCE] apps/docs/components/AuthSmsProviderConfig/AuthSmsProviderConfig.tsx:24 const AuthSmsProviderConfig = () => { [SOURCE] apps/docs/components/AuthSmsProviderConfig/AuthSmsProviderConfig.tsx:89 export default AuthSmsProviderConfig [DOCS] apps/docs/components/AuthSmsProviderConfig/MessageBirdConfig.mdx:2 import { CostWarning } from './AuthSmsProviderConfig.Warnings' [DOCS] apps/docs/components/AuthSmsProviderConfig/TextLocalConfig.mdx:2 import { CostWarning } from './AuthSmsProviderConfig.Warnings' [DOCS] apps/docs/components/AuthSmsProviderConfig/TwilioConfig.mdx:2 import { CostWarning } from './AuthSmsProviderConfig.Warnings'
Finding
Does the system implement cryptographic key management procedures including key generation, distribution, storage, rotation, and destruction, consistent with PCI DSS Requirement 3.6 and 3.7?
Remediation
Establish and document a comprehensive key management lifecycle for the `DOCS_REVALIDATION_OVERRIDE_KEYS` found in `apps/docs/app/api/revalidate/route.utils.ts`. This must include secure generation, distribution, storage, rotation, and destruction of these and any similar secrets, to ensure compliance with PCI DSS Requirements 3.6 and 3.7.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOC2
AICPA · Loss of enterprise contracts
10 findings · 9 possible FP
SOC2-009
Medium Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The application source code, specifically `apps/design-system/__registry__/index.tsx`, includes an `input-otp` component, which indicates support for Multi-Factor Authentication (MFA) functionality, aligning with the 'support' aspect of the SOC2 CC6.1 requirement, despite the inclusion of irrelevant documentation evidence.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[DOCS] .agents/skills/vitest/references/features-snapshots.md:187 resolveSnapshotPath: (testPath, snapExtension) => { [DOCS] .agents/skills/vitest/references/features-snapshots.md:187 resolveSnapshotPath: (testPath, snapExtension) => { [SOURCE] apps/design-system/__registry__/index.tsx:965 "input-otp-demo": { [SOURCE] apps/design-system/__registry__/index.tsx:966 name: "input-otp-demo", [SOURCE] apps/design-system/__registry__/index.tsx:968 registryDependencies: ["input-otp"], [SOURCE] apps/design-system/__registry__/index.tsx:969 component: React.lazy(() => import("@/registry/default/example/input-otp-demo")), [SOURCE] apps/design-system/__registry__/index.tsx:971 files: ["registry/default/example/input-otp-demo.tsx"], [SOURCE] apps/design-system/__registry__/index.tsx:976 "input-otp-pattern": {
Finding
Does the system implement or support multi-factor authentication for user access, particularly for privileged accounts and administrative interfaces, consistent with CC6.1 requirements for logical access security?
Remediation
Modify the `input-otp` component referenced in `apps/design-system/__registry__/index.tsx` by ensuring it is fully integrated with a robust backend authentication service that enforces Multi-Factor Authentication for all user access, particularly for privileged accounts. This change is necessary to satisfy SOC2 CC6.1 requirements for logical access security.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOX
SEC / PCAOB · Criminal penalties, delisting
8 findings · 8 possible FP
Possible False Positives (8)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
TCPA
FCC · $500-$1,500 per violation
8 findings · 7 possible FP
TCPA-006
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The primary analysis correctly identifies a high-risk compliance gap for TCPA consent record-keeping, as no code evidence was found for this crucial requirement in a system operating in domains (e.g., communication, SaaS) where such consent is mandatory. The absence of an identifiable implementation for this control in relevant contexts constitutes a confirmed risk.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
No matching code patterns found.
Finding
Does the system maintain records of consent that would be sufficient to demonstrate compliance in the event of a dispute, including the date, time, method of consent, and the specific consent language presented to the consumer?
Remediation
Design and integrate a robust consent management mechanism within Supabase's database schemas, ensuring records capture TCPA-required elements like date, time, method, and specific consent language presented to consumers; failure to do so risks significant regulatory penalties for non-compliant communication practices.
Remediation refined by Gemini review
Possible False Positives (7)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
What This Analysis Covers

OpenDocket scans source code patterns — specifically whether code handles regulated data in compliance-aware ways. It searches for evidence of encryption, access controls, consent mechanisms, audit logging, and other patterns that regulators look for.

What It Does Not Cover
  • Only public repository content is analyzed
  • Files in .gitignore are not scanned
  • Infrastructure, deployment, and cloud configuration are outside scope
  • Operational policies and procedures are outside scope
  • This analysis covers code at time of scan — changes after scan date are not reflected
Legal Limitations
  • This report is not defensible in court
  • It does not constitute legal advice
  • It does not satisfy regulatory audit requirements
  • To obtain a defensible compliance assessment, engage a licensed compliance attorney and certified auditor
  • OpenDocket provides directional guidance only
How Findings Are Generated
  • Primary analysis by Claude Sonnet (Anthropic)
  • Verification by Gemini 2.5 Flash (Google)
  • Question libraries are open source and community-maintained
  • All questions cite regulatory source text
  • Questions have not been validated by a licensed attorney
Why Two Models?

Claude Sonnet scans broadly — it finds every pattern that could indicate a compliance risk. This produces a comprehensive set of findings but includes noise from documentation files, config references, and test data.

Gemini 2.5 Flash then challenges each finding independently. It asks: is this evidence from actual application code? Would a regulator actually find this concerning? Is the severity appropriate?

The result is a tiered output:

  • CONFIRMED — Gemini agrees this is a real risk
  • CONTEXT DEPENDENT — Risk depends on deployment/infrastructure
  • POSSIBLE FALSE POSITIVE — Likely noise, review before acting

The confirmed count is the number you should act on. The total count shows the full scope of what was examined.

Evidence Tiers

Evidence is classified into three tiers based on file type:

  • [SOURCE] — Application source code (.ts, .py, .go, .rs, etc.) — strongest evidence
  • [CONFIG] — Configuration files (.yml, .json, .toml, Dockerfile) — moderate evidence
  • [DOCS] — Documentation (.md, .txt, .html) — context only, cannot produce High Risk findings

A finding is only classified as High Risk if supported by at least two source code files with matching evidence. Documentation references alone produce Pattern of Concern at most.

How to Use This Report
  • Share with your engineering lead for remediation planning
  • Share with your attorney as a starting point for compliance review
  • Re-scan after remediation to track progress
  • Do not present this as proof of compliance