đŸ”„ The DB Grill đŸ”„

Where database blog posts get flame-broiled to perfection

Supabase PrivateLink is now available
Originally from supabase.com
January 27, 2026 ‱ Roasted by Marcus "Zero Trust" Williams Read Original Article

(Clears throat, adjusts glasses, and squints at the screen with an expression of profound disappointment)

Well, well, well. "Connect to your Supabase database without touching the public internet." A round of applause, everyone. You’ve finally implemented a VPC endpoint. It’s truly a revolutionary moment, right up there with salted caramel and putting wheels on luggage. I’m just overwhelmed by the sheer, unadulterated innovation. You’ve taken a standard cloud networking primitive, slapped your logo on it, and written a blog post as if you’ve just solved cold fusion.

Let's unpack this little security blanket you're so proud of. You’ve moved the front door, not eliminated it. You think because you’re using AWS PrivateLink, you've built an impenetrable fortress. What you've actually built is a very exclusive, very complicated VIP entrance to the same nightclub with sticky floors and questionable fire exits. The attack surface hasn't vanished; it’s just
 shifted. And frankly, it's become more insidious.

Before, I knew where to look: your public-facing IPs, your load balancers, your laughably permissive firewall rules. It was honest. Now? Now the threat is inside the house. You’re inviting my applications into your VPC, or rather, you’re punching a hole from my VPC into yours. What about lateral movement? If one of my containerized apps—say, one that has a yet-to-be-discovered Log4j-style vulnerability—gets popped, guess what it has a direct, low-latency, "secure" connection to? Your entire data infrastructure. You haven’t reduced the blast radius; you’ve just pre-wired the explosives to my own network. Synergy!

And you have the audacity to whisper the holy words
 compliance.

This allows you to meet the stringent compliance requirements of standards like HIPAA, SOC2, and PCI DSS.

Let’s be crystal clear. This feature doesn't make you compliant. It’s one line item in a thousand-page audit that you’ve just made ten times more complicated. I can’t wait to sit in a SOC 2 audit meeting with you.

This isn't a compliance solution; it’s a compliance nightmare waiting to happen. You’ve created a shadow IT superhighway. How are you monitoring the traffic on this "private" connection for anomalous behavior? Are you doing any inspection, or are you just letting encrypted data flow directly to the database core because, hey, it’s not the public internet? An attacker exfiltrating gigabytes of PII over this link will look like legitimate application traffic until it shows up on the dark web. Every feature is a potential CVE, and you’ve just gift-wrapped a beautiful one with a private, high-bandwidth bow.

And let’s not even talk about the control plane. You configure this magical private connection through what, exactly? Oh, that’s right, your web-based dashboard. The one that’s sitting squarely
 on the public internet. So a compromised developer account or a simple XSS vulnerability in your oh-so-slick dashboard could reconfigure these "secure" connections, redirect traffic, or tear them down entirely. You’ve secured the data plane by completely ignoring the glaring, web-scale vulnerability of the management plane. Classic.

Look, it's a cute start. A nice little science project. You’ve successfully made your customers' security posture infinitely more complex, and therefore, infinitely more fragile. You’ve given them a powerful tool with none of the guardrails and a false sense of security that will be brutally shattered during their first real penetration test.

But go on, pat yourselves on the back for this networking trick. It’s a bold marketing move. Now, if you'll excuse me, I have to go write a preliminary risk assessment based on your announcement. It’s already three pages long.