Connect Aikido to Lovable in about 5 minutes through Settings → Connectors → Shared connectors. Once linked, Lovable's AI can run AI-powered penetration tests and automated vulnerability scans against your app — catching security gaps before you publish. Aikido works alongside Lovable's built-in Security Reviewer and Security Scan features to give you defence-in-depth without writing a line of security tooling code yourself.
Why connect Aikido to Lovable?
Most founders building with Lovable focus on getting features working fast — which is exactly what AI-assisted development enables. But shipping fast without a security check is like moving into a new house without checking the locks. Aikido fills that gap: it runs AI-powered penetration tests and automated vulnerability scans against your application, then surfaces findings in plain language so you know exactly what to fix, not just that something is wrong.
Lovable already includes a built-in Security Reviewer that blocks ~1,200 hardcoded API keys per day, and a Security Scan that checks Supabase Row Level Security policies before publishing. Aikido sits on top of those guardrails as the next layer of defence — testing your running application the same way a real attacker would. It checks for OWASP Top 10 vulnerabilities, exposed secrets, insecure dependencies, misconfigured headers, and more. Because Aikido is a shared connector, Lovable's AI understands its capabilities and can translate scan results directly into code fixes without you needing to read a security report in a foreign language.
For founders targeting enterprise customers or building apps that handle user data, being able to point to Aikido scan results — alongside Lovable's SOC 2 Type II and ISO 27001:2022 certifications — meaningfully shortens security review conversations. Setting it up takes under five minutes and costs zero credits.
Integration method
Aikido connects to Lovable as one of 17 shared connectors, configured once in Settings → Connectors and then available across every project in your workspace — no manual API wiring required.
Prerequisites
- An active Lovable account (free tier works — connecting shared connectors costs no credits)
- An Aikido account — sign up free at aikido.dev
- Your Aikido API key or OAuth token, found in your Aikido workspace settings
- A Lovable project you want to scan (a deployed or in-progress app works equally well)
- Owner or Admin role in your Lovable workspace (Connectors settings require workspace-level access)
Step-by-step guide
Open the Connectors panel in Lovable Settings
Open the Connectors panel in Lovable Settings
Start by navigating to your workspace settings. In the Lovable editor, click the settings gear icon in the top-right corner of the screen — this opens your workspace settings panel. From there, look for the 'Connectors' section in the left-hand sidebar. Click it to expand the connectors view, then click 'Shared connectors'. This is the hub for all 17 of Lovable's native runtime connectors, including Aikido. You'll see a grid of available connectors. Shared connectors are workspace-level, meaning once you connect Aikido here, every project you build in this workspace can use it — you won't need to repeat this setup per project. Scroll through the list until you find the Aikido card. It will show the Aikido logo and a short description of its capabilities. If a connector is already active, it will show a green 'Connected' badge; if not, it will show a 'Connect' button. At this stage, Aikido should show as not yet connected.
Open Settings → Connectors → Shared connectors and show me the Aikido connector card.
Paste this in Lovable chat
Expected result: The Shared connectors panel is visible and you can see the Aikido connector card with a 'Connect' button.
Authenticate and connect the Aikido connector
Authenticate and connect the Aikido connector
Click the 'Connect' button on the Aikido card. Lovable will open a connection dialog that either redirects you to an OAuth flow on aikido.dev, or asks you to paste in an API key — depending on how Aikido's connector is configured. For OAuth: a browser tab will open to aikido.dev. Log in to your Aikido account if you aren't already, then click 'Authorize' to grant Lovable read/write access to your Aikido workspace. The tab will close automatically and Lovable will show a success confirmation. For API key flow: navigate to your Aikido workspace settings at app.aikido.dev, find the API section, generate a new API key, copy it, then paste it into the Lovable connection dialog and click 'Save'. Critically, you should never paste your Aikido API key directly into the Lovable chat prompt. On free-tier Lovable workspaces, chat history is visible to Lovable's team, and pasted keys can be recovered from commit history. The connection dialog in Settings → Connectors uses Lovable's encrypted Secrets storage (the same Cloud → Secrets mechanism), so your Aikido credentials are isolated in the server-only red zone and never appear in your project's frontend code. Once connected, the Aikido card will update to show a green 'Connected' badge.
Connect the Aikido integration using my Aikido API key. Store it securely and confirm it is working.
Paste this in Lovable chat
Expected result: The Aikido connector card displays a green 'Connected' badge. Lovable confirms the connection was successful and the credentials are stored securely.
Run your first Aikido security scan
Run your first Aikido security scan
With Aikido connected, return to your project in the Lovable editor. Open the chat panel in the bottom-left and describe what you want Aikido to scan. You don't need to know Aikido's internal API structure — just describe the goal in plain English and Lovable's AI will use the connector context to build the right request. A good first scan is a general vulnerability audit of your entire application. Tell Lovable the URL of your deployed app (or the Lovable preview URL) and ask it to run a scan. Aikido will queue the scan on its servers and return findings asynchronously — depending on app complexity, this typically takes between 30 seconds and a few minutes. Lovable will surface the results in the chat panel once they arrive, formatted as a readable summary rather than a raw JSON payload. Each finding will include a severity rating (Critical, High, Medium, Low, or Info), a plain-language description of the vulnerability, the specific location in your code or configuration that triggered it, and a suggested remediation. For apps with sensitive user data or any payment flows, run both a general OWASP scan and a dependency audit to catch vulnerable npm packages. Aikido's dependency scanning checks every package in your package.json against the NVD (National Vulnerability Database), so you'll know immediately if a dependency has a known CVE.
Use the Aikido connector to run a full security scan on my app at [YOUR_APP_URL]. Include an OWASP Top 10 check and a dependency vulnerability audit. Show me the results sorted by severity.
Paste this in Lovable chat
Expected result: Aikido returns a scan report in the chat panel. You see a list of findings grouped by severity (Critical → High → Medium → Low → Info), with plain-language descriptions and file-level locations for each issue.
Fix vulnerabilities with Lovable's AI using Aikido findings
Fix vulnerabilities with Lovable's AI using Aikido findings
Once you have scan results in the chat, you can ask Lovable's AI to fix issues directly — this is where the native connector advantage really shows. Because Lovable has Aikido connector context, it understands the scan output format and can map specific findings back to the right places in your codebase without you having to copy-paste error messages or explain what each finding means. For each Critical or High finding, ask Lovable to fix it. For example, if Aikido flags a missing Content-Security-Policy header, Lovable knows that fix lives in your Edge Function response headers or your index.html meta tags — it will locate the right file, apply the fix, and explain what was changed. If Aikido finds a vulnerable npm dependency, Lovable will update package.json, run the dependency resolution, and verify the updated version resolves the CVE. For RLS policy gaps flagged by Aikido (which can overlap with Lovable's built-in Security Scan), Lovable will generate the correct Supabase RLS policy SQL and explain what access it restricts. After applying fixes, re-run the Aikido scan to verify the issues are resolved. This confirm-fix-confirm loop is the most efficient way to work through a vulnerability report and is standard practice in professional security engineering. Most Lovable apps can get from 'initial scan' to 'all Critical and High issues resolved' in a single focused session.
Aikido found these security issues in my app: [PASTE FINDINGS FROM STEP 3]. Fix the Critical and High severity issues first. Explain each fix so I understand what was vulnerable and why the fix works.
Paste this in Lovable chat
Expected result: Lovable applies targeted code fixes for each Critical and High finding, explains the changes in plain language, and confirms which files were modified. The Aikido connector shows fewer or zero Critical/High findings on the follow-up scan.
Set up ongoing automated security monitoring
Set up ongoing automated security monitoring
A one-time scan is valuable, but the real benefit of Aikido is continuous monitoring — catching new vulnerabilities that emerge as you add features, change dependencies, or as new CVEs are discovered against packages you already use. Use Lovable to configure Aikido's automated scan schedule so your app is regularly checked without you having to remember to trigger it manually. In the Lovable chat, ask for a recurring scan configuration. Aikido supports scheduled scans (daily, weekly, or on every deployment) and can send alerts via email or Slack when new findings appear. If your workspace has the Slack connector active alongside Aikido, Lovable can wire up a notification workflow so your team receives a Slack message whenever a new High or Critical vulnerability is detected. This is particularly useful for founders who aren't logging into Lovable every day but still want to know if their live app develops a security gap. For teams building toward SOC 2 compliance (a common requirement when selling to enterprise customers), Aikido's audit trail — the history of scans, findings, and resolutions — serves as documented evidence that you perform regular security testing. Lovable's own SOC 2 Type II certification covers the platform itself; Aikido's continuous scanning covers your application layer. Together, they give you the security posture documentation that enterprise procurement teams look for.
Configure Aikido to run automated weekly security scans on my app. Send a Slack notification if any new Critical or High findings appear. Use my existing Slack connector for the notifications.
Paste this in Lovable chat
Expected result: Aikido is configured with a weekly scan schedule. A Slack notification workflow is active. You receive a confirmation message showing the next scheduled scan date and the Slack channel where alerts will appear.
Common use cases
Run your first Aikido security scan
Use Aikido with Lovable to run your first aikido security scan. This is one of the most common use cases when integrating Aikido into your Lovable application.
Open Settings → Connectors → Shared connectors and show me the Aikido connector card.
Copy this prompt to try it in Lovable
Fix vulnerabilities with Lovable's AI using Aikido findings
Take your Aikido integration further by fix vulnerabilities with lovable's ai using aikido findings. This builds on the basic setup to create a more complete experience.
Connect the Aikido integration using my Aikido API key. Store it securely and confirm it is working.
Copy this prompt to try it in Lovable
Set up ongoing automated security monitoring
Prepare your Aikido integration for production by set up ongoing automated security monitoring. Ensures your integration works reliably for real users.
Use the Aikido connector to run a full security scan on my app at [YOUR_APP_URL]. Include an OWASP Top 10 check and a dependency vulnerability audit. Show me the results sorted by severity.
Copy this prompt to try it in Lovable
Troubleshooting
Aikido connector shows 'Connected' but scans return no results or time out
Cause: Aikido needs network access to your deployed application URL. Lovable's preview URL (the in-editor iframe preview) is not publicly routable — Aikido cannot reach it for external penetration testing.
Solution: Make sure you're scanning your published Lovable app URL (the one you get after clicking the Publish icon in the top-right), not the editor preview URL. If you haven't published yet, click the Publish icon, review the security settings, and publish — then give Aikido the production URL. Check Cloud → Logs if scans still fail, as Edge Function invocation errors will appear there.
Aikido API key connection fails with 'Unauthorized' or 'Invalid credentials' error
Cause: The API key was pasted incorrectly (trailing whitespace is a common culprit), the key was generated in the wrong Aikido workspace, or the key has since been revoked in Aikido's settings.
Solution: Go to app.aikido.dev → Settings → API Keys. Revoke the old key and generate a fresh one. Copy it carefully (use the copy button rather than selecting text manually to avoid whitespace). Return to Lovable → Settings → Connectors → Shared connectors → Aikido → edit the connection and paste the new key. If the problem persists, verify you are logged into the correct Aikido workspace — organizations with multiple workspaces can have separate API key scopes.
Aikido findings reference vulnerabilities in files that Lovable says it already fixed
Cause: Aikido scans your deployed application, and deployments in Lovable are not automatic — changes applied in the Lovable editor do not update the published app until you click Publish → Update.
Solution: After Lovable applies code fixes from an Aikido report, click the Publish icon in the top-right and select 'Update' to push the fixed code to your live deployment. Wait for the deployment to complete (typically under 60 seconds), then re-trigger the Aikido scan. Lovable's publish flow runs the built-in Security Scan at this point too, giving you a second verification pass before the updated code goes live.
Best practices
- Run an Aikido scan before every major feature release, not just at initial setup — new features often introduce new attack surface, and catching issues before users reach them is always cheaper than fixing them after.
- Treat Critical and High findings as release blockers. Medium findings can go into your backlog, but anything Critical or High should be resolved before you publish an update to a production app that handles real user data.
- Use Aikido's dependency audit alongside every time you ask Lovable to add a new npm package. New packages bring new transitive dependencies, and even popular packages sometimes have unpatched CVEs — catching them at install time prevents security debt from accumulating.
- Never share Aikido scan results publicly or paste them into open GitHub issues. Scan reports describe exactly how your application is vulnerable, which makes them high-value targets for attackers if they end up in a public location.
- Pair Aikido with Lovable's built-in Security Reviewer and Security Scan for layered defence. Lovable's Security Reviewer catches hardcoded secrets and injection risks at code-generation time; Aikido's external scan catches runtime vulnerabilities that only appear when the app is running and network-accessible.
- When building toward enterprise sales or compliance requirements, export Aikido scan reports after each resolution cycle and store them. This creates an audit trail showing that you perform regular security testing — a standard requirement for SOC 2, ISO 27001, and many enterprise procurement questionnaires.
- Configure Aikido alerts to go to your team's primary communication channel (Slack or email) rather than just one person. Security findings that only one founder sees can sit unaddressed during vacations or busy sprints.
- After connecting Aikido, ask Lovable to review your Supabase Row Level Security policies specifically — RLS misconfigurations are the most common data exposure vector in Lovable apps, and Aikido's findings combined with Lovable's native RLS understanding make this a uniquely fast fix loop.
Alternatives
Choose GitLab if your priority is code versioning, backup, and team collaboration on source code rather than security testing — GitLab is a code repository and CI/CD platform, not a vulnerability scanner.
Choose VS Code if you want to manually audit your Lovable project's code in a full IDE environment — useful for experienced developers who prefer reading code directly, but lacks Aikido's automated scanning and CVE database.
Choose Duo Security if your security concern is user authentication strength (multi-factor auth, login verification) rather than application vulnerabilities — Duo protects the login door while Aikido checks the walls and windows.
Frequently asked questions
Does connecting Aikido to Lovable cost any credits?
No. Connecting a shared connector in Settings → Connectors costs zero Lovable credits. Credits are consumed when you use the Lovable AI chat to build or modify features — asking Lovable to interpret Aikido findings or apply a fix does consume credits in the normal way, but the connection itself and triggering scans through the connector do not. Aikido's own pricing applies separately on the Aikido side.
Can Aikido scan Lovable's preview (the in-editor iframe) or only published apps?
Aikido performs external penetration testing and vulnerability scanning, which requires network access to a publicly routable URL. Lovable's in-editor preview runs in an iframe that is not publicly accessible, so Aikido can only scan your published app URL. Publish your app first using the Publish icon in the top-right, then point Aikido at the resulting public URL.
What is the difference between Aikido and Lovable's built-in Security Reviewer?
Lovable's built-in Security Reviewer runs at code-generation time — it inspects the code Lovable writes before it enters your project, catching hardcoded API keys, injection risks, and XSS patterns. Aikido runs against your deployed, live application from the outside, the same way a real attacker would approach it. The two tools catch different classes of vulnerability and work best together: Security Reviewer as a first pass during development, Aikido as an external validation once the app is running.
Will Aikido findings be accurate for a Lovable app built on Vite and Supabase?
Yes. Aikido scans the running application, not the source code framework, so it works against any web application regardless of how it was built. For a Lovable app specifically, Aikido is particularly effective at catching misconfigured HTTP security headers, exposed Supabase endpoints, vulnerable npm dependencies, and OWASP Top 10 issues that can appear in any React + Vite + Supabase stack.
I'm a non-technical founder. Can I actually understand and act on Aikido's security findings without a developer?
Yes, especially when using Aikido through Lovable. The native connector means Lovable's AI can translate Aikido's technical findings into plain-language explanations and apply fixes directly in your codebase — you don't need to understand what a Content-Security-Policy header is to fix one. For complex cases where the findings require architectural changes, RapidDev's team can help review Aikido reports and implement security improvements in your Lovable project.
Does Aikido scanning affect my app's performance or uptime while it runs?
Aikido's automated scans are designed to be non-disruptive and will not take your app offline. However, penetration testing involves sending test payloads to your application, which can briefly increase request volume. For apps on Lovable's free tier (Tiny instance), running a scan during peak user hours is not recommended. Schedule automated scans for off-peak times, or trigger manual scans when you know traffic is low.
Talk to an Expert
Our team has built 600+ apps. Get personalized help with your project.
Book a free consultation