Lovable: Public Project Visibility Removed

Lovable

Following a security incident on April 20, 2026 β€” where a backend regression had exposed the source code and AI chat histories of public projects to any authenticated Lovable user for 48 days β€” Lovable permanently removed the 'public' project visibility tier on April 22. All existing public projects were automatically converted to Workspace visibility. The platform now supports two access modes: Workspace (default, all plans) and Restricted (Business/Enterprise only). This is a breaking change for users who relied on public project sharing or community remixing.


Background: The April 2026 Security Incident

On April 20, 2026, a security researcher publicly disclosed a broken object-level authorization (BOLA) vulnerability in Lovable's API. The flaw allowed any authenticated user β€” including those on a free account β€” to access the source code, database credentials, AI chat histories, and customer data of other users' public projects in as few as five API calls.

The vulnerability was traced to a backend regression introduced in February 2026, when Lovable unified its permissions layer and accidentally re-enabled access to chat histories on public projects β€” undoing security protections deliberately built throughout 2025. The regression went undetected for 48 days before public disclosure. A fix was deployed within two hours of the April 20 disclosure.

Lovable's initial response drew significant criticism: the company first characterized the exposed data as "intentional behaviour," then attributed the confusion to unclear documentation, and eventually acknowledged the mistake in a formal apology. CEO Anton Osika later stated: "I take accountability."

What Changed on April 22, 2026

Two days after the vulnerability was patched, Lovable made a permanent product decision: the "public" project visibility tier was removed entirely.

Public visibility no longer exists. As of April 22, 2026, it is no longer possible to create a public project on Lovable. All projects previously set to "public" were automatically migrated to workspace visibility. The sole exception: Lovable's own official remixable templates, which retained their public status.

The new visibility model has two tiers:

  • Workspace (default for all plans): All workspace members and invited collaborators can view, remix, or edit the project based on their assigned role.
  • Restricted (Business and Enterprise plans only): Only the project owner and explicitly invited collaborators can access the project; other workspace members have no visibility.

Impact on Users

For developers who used public projects to build portfolios, share work, or enable community remixing, this change is immediately breaking. Projects that were publicly discoverable via a link are now inaccessible outside the workspace. Users who relied on Lovable's "public" tier for open sharing need to either invite collaborators explicitly or publish their apps to an external URL.

Lovable communicated directly with affected project owners whose projects were converted, giving them the opportunity to adjust visibility settings within the new framework.

The Broader Signal

The incident and Lovable's handling of it became a flashpoint in discussions about the security posture of AI-assisted development platforms. The speed at which vibe-coding tools enable rapid app creation amplifies the consequences when the platform mishandles permission models β€” particularly for projects that may contain database credentials, API keys embedded in chat context, or sensitive customer data. Lovable's decision to permanently remove public visibility β€” rather than rebuild it with stricter guardrails β€” reflects a deliberate trade-off: reducing the platform's attack surface at the cost of an open-sharing use case.