Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions apps/design-system/content/docs/fragments/admonition.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ Only ever use the `primary` (green) button `type` on a `default` Admonition. Eve
## Responsive

{' '}

<ComponentPreview
name="admonition-responsive"
className="[&_.preview>[data-orientation=vertical]]:sm:max-w-[70%]"
Expand Down
49 changes: 25 additions & 24 deletions apps/docs/content/guides/database/replication/replication-setup.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -139,21 +139,22 @@ First, create an analytics bucket to store your replicated data:
1. Navigate to [Storage](/dashboard/project/_/storage/buckets) → **Analytics** in your Supabase Dashboard
2. Click **New bucket**

<Image
alt="Create new analytics bucket"
src="/docs/img/database/replication/replication-iceberg-new-bucket.png"
width={3560}
height={2146}
/>
<Image
alt="Create new analytics bucket"
src="/docs/img/database/replication/replication-iceberg-new-bucket.png"
width={3560}
height={2146}
/>

3. Fill in the bucket details:

<Image
alt="Analytics bucket details"
src="/docs/img/database/replication/replication-iceberg-details.png"
width={3560}
height={2146}
/>
{' '}
<Image
alt="Analytics bucket details"
src="/docs/img/database/replication/replication-iceberg-details.png"
width={3560}
height={2146}
/>

- **Name**: A unique name for your bucket (e.g., `analytics_warehouse`)
- **Region**: Select the region where your data will be stored
Expand All @@ -170,12 +171,12 @@ First, create an analytics bucket to store your replicated data:
1. Navigate to [Database](/dashboard/project/_/database/replication) → **replication** in your Supabase Dashboard
2. Click **Add destination**

<Image
alt="Add Destination"
src="/docs/img/database/replication/replication-add-destination.png"
width={3560}
height={2146}
/>
<Image
alt="Add Destination"
src="/docs/img/database/replication/replication-add-destination.png"
width={3560}
height={2146}
/>

3. Configure the general settings:

Expand Down Expand Up @@ -265,12 +266,12 @@ Before configuring BigQuery as a destination, set up the following in Google Clo
1. Navigate to [Database](/dashboard/project/_/database/replication) → **replication** in your Supabase Dashboard
2. Click **Add destination**

<Image
alt="BigQuery Configuration Settings"
src="/docs/img/database/replication/replication-bigquery-details.png"
width={3560}
height={2146}
/>
<Image
alt="BigQuery Configuration Settings"
src="/docs/img/database/replication/replication-bigquery-details.png"
width={3560}
height={2146}
/>

3. Configure the general settings:

Expand Down
1 change: 1 addition & 0 deletions apps/docs/public/humans.txt
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,7 @@ Leigh Anne Applewhite
Lenny Urbanowski
Leonardo Santiago
Liam Cloud Hogan
Lindsay Moss
Long Hoang
Luca Forstner
Lukas Bernert
Expand Down
10 changes: 10 additions & 0 deletions apps/www/_events/2025-09-10-migrating-from-firebase-mobbin.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,16 @@ In this 45-minute session, Supabase engineers and Mobbin CEO Liau Jian Jie break

This session is built for startup founders and technical leads who want to stay fast without giving up control.

<div className="video-container mb-8">
<iframe
className="w-full"
src="https://www.youtube-nocookie.com/embed/Ugtdc6T2Lwg"
title="Firebase to Postgres: Breaking through the NoSQL ceiling with Mobbin"
allow="accelerometer; autoplay; clipboard-write; encrypted-media; fullscreen; gyroscope; picture-in-picture; web-share"
allowFullScreen
/>
</div>

### Key takeaways

- What breaks when Firebase apps start to scale
Expand Down
10 changes: 10 additions & 0 deletions apps/www/_events/2025-11-20-supabase-agency-webinar.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,16 @@ Supabase provides that foundation. Giving agencies the flexibility, scalability,

In this 45-minute session, three agencies running 40%+ margins share how they combine AI development tech with Supabase to move beyond speed and deliver long-term client value. You’ll learn how to position technical depth, data architecture, and product strategy as the differentiators clients actually pay for.

<div className="video-container mb-8">
<iframe
className="w-full"
src="https://www.youtube-nocookie.com/embed/y477Fb2GwqQ"
title="Why Fast Isn't Enough: How AI Agencies Maintain Premium Pricing in 2025"
allow="accelerometer; autoplay; clipboard-write; encrypted-media; fullscreen; gyroscope; picture-in-picture; web-share"
allowFullScreen
/>
</div>

### What You'll Learn

- Services founders buy after the MVP
Expand Down
67 changes: 35 additions & 32 deletions apps/www/pages/aup.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -10,53 +10,56 @@ export const meta = {

# Acceptable Use Policy

_Last Modified: 15 April 2021_
_Last Modified: 25 February 2026_

This Acceptable Use Policy (this “Policy”) describes prohibited uses of the web services offered by Supabase, Inc. and its affiliates (the “Services”) and the website located at https://supabase.com (the “Supabase Site”). The examples described in this Policy are not exhaustive. We may modify this Policy at any time by posting a revised version on the Supabase Site. By using the Services or accessing the Supabase Site, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others to do so, we may suspend or terminate your use of the Services.
This Acceptable Use Policy (this "Policy") describes prohibited uses of the web services offered by Supabase, Inc. and its affiliates (the "Services") and the website located at https://supabase.com (the "Supabase Site").
By using the Services or accessing the Supabase Site, you agree to the latest version of this Policy. Violation of this Policy may result in the immediate suspension or termination of your Accounts and / or Services.

## No Illegal, Harmful, or Offensive Use or Content
## 1. General Prohibitions

You may not use, or encourage, promote, facilitate or instruct others to use, the Services or Supabase Site for any illegal, harmful, fraudulent, infringing or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, fraudulent, infringing or offensive. Prohibited activities or content include:
**1.1.** You may not use the Services in any manner that materially degrades, disrupts, or interferes with the Services or other customers' use of the Services.
**1.2. Illegal & Fraudulent Activities:** Any activity that violates applicable laws or regulations. This includes but is not limited to the dissemination of child sexual abuse material (CSAM), promoting fraudulent schemes (e.g., Ponzi or "make-money-fast" scams), and identity theft.
**1.3. Infringing Content:** Content that infringes or misappropriates the intellectual property or proprietary rights of others, including wholesale copyright infringement (piracy) or hosting unauthorized streaming services.
**1.4. Harmful Technology:** Viruses, malware, Trojan horses, or any technology intended to damage systems and/or surreptitiously intercept data.
**1.5. Obfuscation:** Using techniques to obfuscate code or application logic uploaded to the Supabase platform to hide malicious intent or bypass platform detection and security controls.

- **Illegal, Harmful or Fraudulent Activities.** Any activities that are illegal, that violate the rights of others, or that may be harmful to others, our operations or reputation, including disseminating, promoting or facilitating child pornography, offering or disseminating fraudulent goods, services, schemes, or promotions, make-money-fast schemes, ponzi and pyramid schemes, phishing, or pharming.
- **Infringing Content.** Content that infringes or misappropriates the intellectual property or proprietary rights of others.
- **Offensive Content.** Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable, including content that constitutes child pornography, relates to bestiality, or depicts non-consensual sex acts.
- **Harmful Content.** Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
- **Platform compliance.** Any activities that are deemed unacceptable by the platforms used by the Supabase Site and Services, including [AWS](https://aws.amazon.com/aup/).
## 2. Artificial Intelligence and Content Manipulation

## No Security Violations
**2.1. Deepfakes & Deceptive or Malicious Synthetics:** Generating or storing synthetic media intended to deceive or harass, including but not limited to non-consensual sexual imagery.
**2.2. Safety Guardrails Circumvention:** Using Services to facilitate the "jailbreaking" of third-party AI models or to bypass safety guardrails.
**2.3. Unauthorized Probing & Scraping:** Storing or processing datasets obtained through web scraping, or performing automated network and system reconnaissance (including port scanning), in violation of a third party's terms of service, robots.txt directives, or without explicit authorization.
**2.4. Reputation & SEO/AEO Manipulation:** Creating "gibberish" or nonsensical content, deceptive search engine results, or falsifying reputation metrics (e.g., automated generation of fake social proof or "stars").

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
## 3. Security and Network Integrity

- **Unauthorized Access.** Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
- **Interception.** Monitoring of data or traffic on a System without permission.
- **Falsification of Origin.** Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.
**3.1. Unauthorized Access:** Attempting to probe, scan, or test the vulnerability of any system (including port scanning) outside the requirements of our Vulnerability Disclosure Program.
**3.2. Denial of Service (DoS):** Inundating a target with requests (including flooders, reflectors, and amplifiers) to render it ineffective or slow.
**3.3. Proxy & Anonymization Services:** Operating open proxies, open mail relays, or "proxy farms" used to bypass GeoIP restrictions or IP-based rate limits.
**3.4. Cryptocurrency Mining:** Using Supabase compute resources (including Edge Functions) to mine digital assets or cryptocurrencies.
**3.5. Vulnerability Disclosure:** Exploiting discovered vulnerabilities or publicly disclosing them before a fix is available. Discoveries must be reported privately to Supabase.

## No Network Abuse
## 4. Account and Message Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:
**4.1. Email Requirements:** You may not use temporary, disposable, or "dead-drop" email addresses for your Supabase account.
**4.2. Automated & Bulk Registration:** Creating accounts via automated means, registering accounts in bulk, or maintaining an excessive number of accounts as a single user is prohibited without explicit permission from Supabase.
**4.3. Spam & Deception:** Distributing unsolicited mass messages, altering mail headers to obscure identity, or collecting personal data via phishing and deceptive web forms.
**4.4. Infrastructure Abuse:** Using the Services as a "drop-zone" for stolen data or as command-and-control (C2) infrastructure for malware.

- **Monitoring or Crawling.** Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.
- **Denial of Service (DoS).** Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
- **Intentional Interference.** Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
- **Operation of Certain Network Services.** Operating network services like open proxies, open mail relays, or open recursive domain name servers.
- **Avoiding System Restrictions.** Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.
## 5. Financial Crime and Regulated Goods

## No E-Mail or Other Message Abuse
**5.1. Carding & Financial Fraud:** Using the Services for card testing, card verification, or the storage of stolen financial data.
**5.2. Illegal Trade:** The sale or distribution of controlled substances, drug paraphernalia, or facilitating unregulated gambling and wagering activities.
**5.3. High-Risk Systems:** Use in nuclear facilities, aircraft navigation, or life support systems where failure could lead to death or catastrophic damage.

You will not distribute, publish, send, or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations (like “spam”), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a sender’s identity without the sender’s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.
## 6. Monitoring and Enforcement

## Our Monitoring and Enforcement
**6.1. Investigation and Action:** Supabase reserves the right, in its sole discretion, to investigate, suspend, or terminate access to the Services if Supabase determines that a user's conduct violates this Policy or poses legal, regulatory, security, reputational, or operational risk to Supabase, the Services, or other customers.
**6.2. Reporting:** We may report suspected illegal activity to law enforcement, regulators, or other appropriate third parties. This may include disclosing appropriate customer information and cooperating with investigations into illegal conduct.
**6.3. Obligation:** Supabase has no obligation to monitor user content or activity and does not assume responsibility for user content.

We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Services or Supabase Site. We may:
## 7. Reporting Violations

- investigate violations of this Policy or misuse of the Services or Supabase Site; or
- remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Services or the Supabase Site.

We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.
Reporting of Violations of this Policy

If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please contact us at support@supabase.io.
Report violations to legal@supabase.io or abuse@supabase.io

</SectionContainer>

Expand Down
Loading