We work: Mon-Fri From 10:00 to 23:00 (CST, Chicago)
Lets's talk:
What way of communication is best for you?
Contacts
FAQ
Yes, all discussions and findings are confidential. Only after all bugs and vulnerabilities are fixed, with your permission we would like to publish our report, as it will serve as a proof of your increased security to your users and investors.
During the audit, we stay in touch, ask developers questions, and share preliminary findings via your preferred communication channels.
Think of it as tests to evaluate the found vulnerabilities. The attack simulation is conducted in a safe, local environment. It is needed to eliminate all false-positives findings.