Healthtech on Supabase: patient records and RLS pitfalls that stick
A patient record is not a support ticket
In a healthtech product, the access rule isn't "my organization" but "my patient, my practitioner, this treatment, this period". That's finer-grained than a typical B2B SaaS.
What breaks often
The right level of rigor
A healthcare product must be able to answer: who saw what data, when, and why. If the answer depends on an optional application log, that's not enough for HDS-hosted data.
Related articles
Three adjacent analyses to keep exploring the same attack surface.
Supabase and HR software: configuration mistakes that expose payslips
The Supabase mistakes that matter in HR or payroll software: incomplete RLS policies, overly open buckets, and weak organization boundaries.
RLS mistakes: the 2026 guide for Supabase, PostgreSQL, and multi-tenant access control
The most expensive RLS mistakes in Supabase and PostgreSQL: incomplete policies, overpowered roles, fragile JWT assumptions, exposed service_role keys, and false confidence.
The 5 vulnerabilities we find in 90% of healthtech startups
APIs exposing patient data, public buckets, missing RLS — recurring mistakes in e-health.
Sources
Editorial analysis based on official vendor, project, and regulator documentation.
Related services
If this topic maps to a real risk in your stack, these are the most relevant CleanIssue audits.