A full-spectrum security audit of a Financial Services CRM handling 847 customer records with SSNs, credit cards, and login credentials. We broke it down finding by finding — SQL injection, plaintext PII, broken authentication, exposed configs — and fixed every last one.
DataVault CRM is a cloud-native customer relationship management platform used by mid-market financial services firms. Our engagement began with a black-box assessment: no source code, no architecture docs — just an API endpoint and a user account. Within 4 hours, we had identified critical data exposure and injection vectors that gave us access to the production database.
The application had no Web Application Firewall, no rate limiting on auth endpoints, and was storing sensitive fields — Social Security Numbers, credit card numbers, and plaintext passwords — in the database with no encryption layer. The JWT secret was hardcoded in an environment configuration file that was publicly accessible from the web root.
Over the full 3-day engagement, we mapped the entire attack surface, demonstrated active exploitation in a controlled proof-of-concept, and delivered a complete remediation roadmap with severity-ranked findings, code-level fix recommendations, and a post-remediation verification suite. All 21 findings were resolved within 14 days.
11 of the 21 findings were classified Critical — meaning active exploitation in the wild was not just possible, but likely. Here's what we found.
.env file was publicly accessible from the web root, exposing database credentials, JWT signing secrets, API keys, and third-party service tokens.* access to Secrets Manager. Compromise of one service account would cascade across the entire cloud environment.Every finding was mapped to the compliance frameworks that apply to financial services organizations handling PII and payment card data.
Watch us walk through the DataVault findings live — showing each exploit, explaining the impact, and demonstrating the fix. Video coming soon once the channel is set up.
More detailed security assessment walkthroughs are being added. Each one covers a different industry, tech stack, and threat profile.
Run a free surface scan on your domain, or schedule a full engagement. We break it down finding by finding — the same way we did for DataVault.