Lovable
App Quality Report
Powered by Testers.AI
B84%
Quality Score
7
Pages
106
Issues
8.0
Avg Confidence
7.9
Avg Priority
41 Critical49 High15 Medium1 Low
Testers.AI
>_ Testers.AI AI Analysis

Lovable was tested and 106 issues were detected across the site. The most critical finding was: Unconsented Third-Party Telemetry to Sentry (Potential PII exposure). Issues span Security, A11y, Performance, Other categories. Persona feedback rated Visual highest (7/10) and Accessibility lowest (5/10).

Qualitative Quality
Lovable
Category Avg
Best in Category
Issue Count by Type
Content
31
A11y
29
UX
22
Security
6
Pages Tested · 7 screenshots
Detected Issues · 106 total
1
Unconsented Third-Party Telemetry to Sentry (Potential PII exposure)
CRIT P9
Conf 9/10 Other
Prompt to Fix
In the frontend Sentry integration, implement a before_send callback to scrub PII from all envelopes (remove user IDs, emails, IP addresses, and any identifiable context). Set Sentry to not capture PII by default (sendDefaultPii = false). Add a user-facing consent toggle for telemetry with a clear privacy note. Gate all telemetry behind this consent and a feature flag to disable globally in non-prod. Update privacy policy to reflect third-party data sharing with Sentry and what is collected.
Why it's a bug
The client app sends failure/telemetry data to a third-party service (Sentry) without any visible consent indicators in the network activity. Telemetry can inadvertently include PII or sensitive context in error envelopes. This constitutes third-party data sharing and potential data minimization violations if unredacted.
Why it might not be a bug
Sentry is a common analytics/monitoring provider; telemetry may be covered by privacy policy and user consent in-app. Without payload visibility, it could be legitimate, but current logs show outbound to a third party with no consent signals, which is risky and should be clarified.
Suggested Fix
1) Introduce explicit user consent for telemetry with a visible opt-in/opt-out. 2) Limit telemetry to non-identifying data by enabling Sentry's before_send hook to scrub PII (e.g., user identifiers, emails, IPs) and disable capturing PII by default. 3) Set sendDefaultPii to false and review all data sent in envelopes. 4) Add a configuration flag to disable Sentry in non-production or for users who opt out. 5) Update privacy policy and in-app privacy disclosures to clearly state third-party data sharing with Sentry and what is collected.
Why Fix
Protect user privacy, reduce risk of accidental PII exposure, and align with privacy regulations (GDPR/CCPA). Clear consent and data minimization will improve trust and reduce potential regulatory exposure.
Route To
Privacy Engineer
Page
Tester
Pete · Privacy Networking Analyzer
Technical Evidence
Network: POST https://o4506071217143808.ingest.us.sentry.io/api/4506071220944896/envelope/?sentry_version=7&sentry_key=58ff8fddcbe1303f19bc19fbfed46f0f&sentry_client=sentry.javascript.nextjs%2F10.28.0
2
AI/LLM Endpoint Detected on Page Load - Potential Data Leakage / Performance Issue
CRIT P9
Conf 9/10 Other
Prompt to Fix
Investigate and remove or lazily load any AI/LLM API calls that fire on page load. Move initialization to a user action (e.g., button click) or protected lazy-loading flow. Ensure prompts/data are not sent until user consent is given. Remove or hide any end-to-end prompts from initial render and audit logs to avoid exposing sensitive AI context.
Why it's a bug
Console shows an AI/LLM endpoint detection warning on initial render (⚠️ AI/LLM ENDPOINT DETECTED). This suggests AI-related calls or probes may be happening during page load, which can leak prompts/data, impact performance, and introduce privacy concerns.
Why it might not be a bug
If the log is only a detection notice and there are no actual requests to AI endpoints on load, this might be false positive. Confirmation needed from behavior, not just logs.
Suggested Fix
Defer any LLM/embedding API calls until explicit user action or user consent; lazy-load/async initialize AI features; remove or guard any AI endpoint calls during initial render; sanitize/logs to not expose prompts.
Why Fix
Prevents unintended data exposure and reduces unnecessary network activity on first paint, improving performance and privacy posture.
Route To
Frontend Engineer (React/Next.js) / Security Engineer
Page
Tester
Jason · GenAI Code Analyzer
Technical Evidence
Console: ⚠️ AI/LLM ENDPOINT DETECTED
3
Debug JSON content exposed in UI (internal page data rendered to users)
CRIT P9
Conf 9/10 SecurityOther
Prompt to Fix
Remove the production debug JSON block from the UI. Gate all debug overlays behind a ENV flag, ensure only user-facing content renders, and replace internal state dumps with minimal, safe UI indicators. Add automated tests to verify debug data is not rendered in production.
Why it's a bug
The page content includes a visible JSON block labeled 'Page Content:' with internal structure (e.g., buttons array and properties). Rendering internal state/structure in production UI can leak implementation details, expose selectors/IDs, and erode user trust. This is a clear UI/UX and security concern.
Why it might not be a bug
If this JSON is strictly a debug overlay disabled in production but visible in the screenshot, it still indicates a leak in production builds or an accessibility/privacy risk that should be fixed before release.
Suggested Fix
Remove or hide the raw internal state JSON from the UI in production. Gate debug overlays behind a feature flag or environment check. Consider rendering only user-facing content and using proper logging instead of rendering internal structures in the DOM.
Why Fix
Prevents information leakage, improves user trust, and aligns production UI with security/privacy best practices.
Route To
Frontend Engineer / Security Engineer
Page
Tester
Jason · GenAI Code Analyzer
+48
48 more issues detected  View all →
Sentry DSN key exposed in URL query parameters during client...
Public exposure of security endpoint without authentication
Repeated srcset parsing warnings due to invalid descriptor i...
and 45 more...
Unlock All 106 Issues
You're viewing the top 3 issues for Lovable.
Sign up at Testers.AI to access the full report with all 106 detected issues, detailed fixes, and continuous monitoring.
Sign Up at Testers.AI or let us run the tests for you