🔒 I Audited 11,026 Bubble Apps for Security — Here’s What I Found

Mostly are custom domain apps (more than 99%). How I got it - definitely not going to put in public, but you can get it. It’s not rocket science.

About the authenticity of the 11K app claim, you let me know how I would prove, I have actually audited that app (for your reference, these numbers have gone to 16K for now).

About the methodology of putting in the public on how I have audited it - no need for now (only you have asked - no one else), so there is not much interest, so I most probably will not post. Maybe in the future. Although I have recently shared with some of the people - even created the detailed pdf.

All questions are welcome.

@genstate

Man, what’s your problem with this post? Just because you don’t know how to locate the Bubble apps that exist doesn’t mean that other people don’t. There are plenty of ways to tell if an app you’re on is built on Bubble:

  • Run window.app in the developer console and review the result
  • Check the app’s network requests to see if it requests Bubble packages
  • Check the elements DOM for ‘bubble-element’ references

@ankur1 has posted something, the numbers line up with what I’ve found in my own audits (of even more apps, which no doubt you wouldn’t believe), and your first instinct is to doubt it rather than learn from it…

It’s just how peer reviewed studies are done.

To put it simply, someone releases their findings, shares the methodology so others of the same field can reproduce the tests.

This is done to support, or otherwise, the original research and findings. The methods must be clearly described, consistent and reproducible.

Please share a copy of this PDF with me

You can use CT Logs and fingerprinting to get the sites.

I like to use crt.sh for things sometimes. It gives some pretty good info on sites.

Anyway, the results are interesting.

Lot’s of things I need to check in my own apps.

Thanks for the post

I’ll admit I came into this skeptical — which, to be fair, is kind of rule number one in security: question everything.

Part of that skepticism came from annoyance, honestly. The idea of someone analyzing my apps just to sell me services rubbed me the wrong way. I challenged the OP to see whether they’d respond professionally (with transparency and integrity) or defensively.

After looking into it myself, I can see how targeted searching makes it easier to identify and collate a list of Bubble apps. Had that been explained up front, I probably would’ve been more curious than critical. But the continued lack of transparency, especially when @senecadatabase was able to casually outline a method, still makes me wonder if the OP actually did the work or simply drew conclusions from assumptions.

Thanks for enlightening me about peer-reviewed studies. But let me tell you- that’s not a peer-reviewed study, and I didn’t ask anyone for a review. I simply stated what I found. Otherwise, I will publish the paper in some journal and then publish it. @ihsanzainal84

@luke.ford will dm you.

I have a very honest question for you…

are you not disclosing how you scanned these sites because you think it may have violated Bubble’s Terms of Service?

Because, depending on how you did it, it could very well violate the terms.

Not saying you did, but just asking

@genstate Always question everything but learn how to ask question without making assumption first. I never personally tagged you, so I’m not sure why you are annoyed.

You didn’t challenge me or anything. You already had the assumption “this post is bullshit” and you just wrote it. Nothing more than that.

Yeah, putting the methodology was never the intent of this post (Intent was to raise the awareness, how many apps leaks the data). As I stated earlier, if enough people ask me, I will try to put my methodology (may be in another post or don’t put that all) but you never interested in that.
About selling my services- yeah, what’s wrong with it?

About the proof of work, I already asked: how can I prove it to you? Rather than answering that, you just labeled me as someone who wrote anything without doing any work.

Yeah, I am not disclosing how I scanned these sites. No, it never violated Bubble’s Terms of Service because I used publicly available data. All these leaks are due to poor developer practices rather than Bubble.

Just to give you an overall idea:

  1. Privacy rules checks- most people forget to set privacy rules.
  2. Data API- people leave it open.
  3. Google Maps API- people don’t domain restrict it.
  4. API keys- people don’t mark keys as private, so they are visible.

I even shared everything with the official Bubble team; they don’t have any issue, as they clearly know it’s not their issue but rather poor developer practices.

@senecadatabase hope i have answer you. Let me know if you have further questions.

Thanks.

On most platforms, that kind of activity would likely violate the Terms of Service. Looking at a single app manually is one thing, but scanning 16,000 apps with automation moves into a grey area, mainly because you’re generating a large volume of requests against the platform.

Even if Bubble has said they’re fine with it, that scale still raises legitimate privacy and data protection concerns in a lot of areas.

I think the info you gave is good as far as what you found.

I do understand some of the concerns about how you arrived at your findings.

Plus, as was mentioned, not disclosing your methods, I thought (after I thought about it), was a little suspicious.

Anyway, thanks for the feedback

@scepanovicpavle00 make sense.

That’s also one question I want to raise with Bubble - they should add rate limits on the Bubble server and block the IP address if someone exploits the server unnecessarily.

Yes, isn’t that what you did?

@senecadatabase no, I don’t think so..

That’s what i am saying, if i have exploit , bubble should block my ip address. Bubble should secure their server.

That’s exactly what you did, and now you’re deflecting the blame back to Bubble.

Look, I didn’t have a problem with your post originally, but you keep deflecting.

It’s like, hey, I scanned 16,000 apps, but I won’t tell you how I did it.

Many of us know that there are a lot of methods that are grey areas you can use. Brute force, and on and on.

The problem I now have is you keep deflecting and acting like it’s a mystery.

I’m pretty sure I’m about 100% positive I know how you did it…

but I don’t understand why you think it should be a mystery.

You lost me there

@senecadatabase

I’m not blaming Bubble; I recommend they implement rate limits to stop bots from abusing their servers. I won’t disclose my method for finding the vulnerability - it’s straightforward to reproduce if you choose to investigate.

I am not trying to keep mystery or something - but I don’t want to share that. Just that.

Just to give idea - Flusk also works in the same way.

The difference is that Flusk only runs scans when a developer asks it to, it’s consent-based. What you did was scan thousands of apps you don’t own, unprompted. That’s not the same thing, and that’s exactly why it falls into that grey area I’ve been talking about.

You exploited a Bubble loophole and now you’re saying they should fix it…

and, you’re still not saying how you did it.

So, I’ll let others decide on this. I don’t know what else I can say

@senecadatabase

Ahh okay. Now I got your concern.

But why I need someone consent when it’s public info - moreover I didn’t publicly share url and what exact data I found into those apps.

Because you’re scanning sites on a public platform…

free doesn’t mean to harvest however you want.

There are terms of service and other rules that this platform doesn’t cover.