Authentication and session
Login, password handling, session lifecycle, MFA, OAuth, SSO, magic links, password reset. The most frequently broken part of every web stack.
Manual security review of your source code. We read the auth path, the crypto layer, the data-handling code, and the integrations. Findings come with line numbers and pull-request-ready fix suggestions.
Areas we focus on.
Login, password handling, session lifecycle, MFA, OAuth, SSO, magic links, password reset. The most frequently broken part of every web stack.
Per-route checks, per-record checks, IDOR risk, broken object-level authorization, role-based vs attribute-based, multi-tenant data isolation.
Key management, encryption at rest and in transit, password hashing, token signing, JWT verification, secrets in code or logs.
SQL injection, command injection, deserialization, file uploads, path traversal, XXE. Across every entry point and protocol.
Webhook signature verification, third-party API trust, SSO assertion handling, OAuth callback validation. Common source of trust-boundary mistakes.
High-risk dependencies, abandoned packages, transitive-trust risk, supply-chain risk. Triaged for actual exploitability, not just CVE noise.
How a code review runs.
Deliverables.
Each finding: file, line, severity, exploit chain, recommended fix, code snippet. PR-friendly format.
For straightforward fixes, we open the PR. Your engineer reviews, tunes, merges. Saves a sprint.
Filtered list of dependencies that need attention. The signal-to-noise ratio matters more than the CVE count.
Where the code disagrees with the documented threat model. Useful to update either the code or the model.
Patterns we saw repeatedly. Useful for adding to your internal code-review checklist or onboarding doc.
After fixes ship, we re-run the relevant slice and mark each finding resolved.
When a code review pays off.
You are about to point real users at the system. A pre-launch code review catches the mistakes a pentest would not see from the outside.
Auth rewrite, multi-tenancy added, payment integration in. Code review verifies the new path before customers find the holes.
Five new engineers shipped a sprint of new code. A code review surfaces what onboarding missed, before it ends up in production.
SOC 2 and ISO 27001 reviewers increasingly expect evidence of independent code review.
Code-review FAQ.
Yes, as a starting point. The output is filtered to less than 10% before a human reads it. The report you receive is what humans found, not what scanners screamed about.
JavaScript, TypeScript, Python, Go, Rust, Ruby, Java, C#, Swift, Kotlin, PHP. C and C++ on request. Other languages: ask.
Infrastructure-as-code (Terraform, CloudFormation, Helm, Kustomize) is in scope by default for cloud-native projects. Ask if you need DevOps-config audit too.
No. Read-only access to the directories in scope is enough. If you cannot grant repo access, an export works.
Every finding is manually verified. Severity and exploitability are based on the actual code path, not the pattern match.
30-minute scoping call gets you a fixed fee, a written scope, and a finish-by date. We never bill by line of code reviewed.