Skip to content
Cyber ArmyCyber Army

SaaS & Platforms

We help B2B SaaS and platform teams protect customer data at scale. Our focus: multi-tenant isolation, RBAC/ABAC done right, SSO/SCIM, API & webhook security, rate limiting & abuse defenses, and CI/CD supply chain hardening.

Why it matters

  • • Prove tenant isolation to enterprise buyers
  • • Prevent cross-tenant data access and privilege creep
  • • Secure SSO/SAML/OIDC and lifecycle via SCIM
  • • Stop enumeration, carding, and bulk-scrape abuse
  • • Reduce pipeline/secret leaks in CI/CD
  • • Deliver audit-friendly evidence (SOC 2/ISO 27001)

What we test

  • Multi-tenant isolation: org/tenant scoping, RLS/filters, cross-tenant IDOR, cache key isolation, object storage prefixing, export/report scoping, background jobs and webhooks executing in the correct tenant.
  • RBAC/ABAC: role definitions and custom roles, permission checks on every path, policy bypass (mass assignment, hidden fields), “support/admin” break-glass review.
  • Authentication & SSO/SCIM: OIDC/SAML flows, JIT provisioning, role mapping, IdP-initiated risks, fallback/password bypass of SSO, SCIM deprovision drift, session fixation/CSRF.
  • APIs & webhooks: BOLA/BFLA, rate limiting and anomaly detection, idempotency keys, pagination/snapshot leaks, webhook signature verification, replay/timestamp windows, outbound SSRF.
  • Abuse & resilience: org/user discovery, invite/reset flows, trial/plan abuse, burst scraping, GraphQL depth/complexity limits, feature flag gating of admin actions.
  • CI/CD & supply chain: secret hygiene in repos/images/logs, build isolation, provenance/signing (e.g., Sigstore), dependency pinning/SBOM, OIDC to cloud with least privilege, environment drift and artifact exposure.
  • Cloud & data: IAM least privilege, KMS, backups/snapshots, data residency and deletion, audit log integrity, network segmentation, egress controls.

Sample test cases

  • Cross-tenant read via ?tenantId= tampering or missing row filters
  • SSO enabled but local password still active for admins (SSO bypass)
  • SCIM deprovisioned user retains API token or session
  • BOLA: access another tenant’s resources by guessing IDs/UUIDs
  • Webhook replay or signature bypass routes events to the wrong tenant
  • GraphQL query without depth/cost limits → high-cost enumeration
  • GitHub Actions OIDC mis-scope grants prod cloud access to CI
  • Object storage prefix traversal leaks other tenants’ exports

What you get

  • • Proof-of-exploit with safe evidence
  • • Reproduction steps engineers can follow
  • • Fix-first guidance with code/config examples
  • • Severity mapped to tenant-breakout and business impact
  • • Executive summary + audit-friendly artifacts (SOC 2/ISO 27001)
  • • Rapid re-test to verify remediation

Who we’re best for

B2B SaaS and platforms, marketplaces, devtools, data/AI platforms, and products with enterprise SSO, custom roles, and webhook ecosystems.