Security Assessment

Pentest & Hardening Summary

This is a sanitised public summary of our most recent independent security assessment. Sensitive technical details, exploit proofs-of-concept, and raw scanner output are not included. The full report is available to qualified prospects and customers under NDA.

Assessment periodQ1 2026
PeriodJanuary – March 2026
Findings13 total
Resolved13 / 13
Critical/High open0

Assessment overview

Methodology & scope

Assessment details

  • Auditor: Independent third-party security firm (name available under NDA)
  • Methodology: OWASP Testing Guide v4.2, PTES, CVSS v3.1 scoring
  • Environment: Dedicated assessment environment with synthetic tenant data
  • Approach: Grey-box testing (authenticated user + unprivileged accounts)

In scope

  • Web application (React SPA)
  • REST API (Supabase PostgREST + Edge Functions)
  • Network and infrastructure layer
  • Authentication and session management
  • Multi-tenant access control and RLS

Test coverage

Areas assessed

Web Application

Full authenticated and unauthenticated surface area of the React SPA, including all UI flows and client-side logic.

REST API

All Supabase PostgREST endpoints, Edge Functions, authentication endpoints, and webhook receivers.

Infrastructure

TLS configuration, HTTP headers, certificate chain, DNS configuration, and CDN edge security posture.

Access Control

Multi-tenant isolation, RLS policy coverage, privilege escalation attempts, and session management.

Input Validation

SQL injection, XSS, XXE, SSRF, and injection vectors across all authenticated and unauthenticated endpoints.

Authentication

MFA bypass attempts, session fixation, token leakage, OAuth flow review, and passkey implementation.

Executive summary

Findings by severity

Critical
0

All resolved

High
1

All resolved

Medium
3

All resolved

Low
5

All resolved

Informational
4

All resolved

No critical-severity vulnerabilities were identified. All high-severity and medium-severity findings were remediated prior to the report finalisation date. The auditor confirmed no vulnerabilities remained open at the time of report sign-off.

Sanitised finding summaries

HighF-001Access Control
CVSSv3: 7.3CWE-307Resolved

Insufficient rate limiting on authentication endpoint

The password authentication endpoint did not enforce rate limiting under certain request patterns, potentially allowing brute-force attempts against user accounts at elevated request rates.

Remediation: Rate limiting and exponential back-off implemented at the API gateway level. Account lockout policy enforced after 10 failed attempts within 5 minutes.

MediumF-002Information Disclosure
CVSSv3: 5.3CWE-209Resolved

Verbose error messages in API responses

Certain API error conditions returned stack traces or internal identifiers that could provide reconnaissance value to an attacker.

Remediation: Error handling refactored to return generic messages to clients. Detailed error context is now logged server-side only.

MediumF-003Session Management
CVSSv3: 5.4CWE-613Resolved

Session tokens not invalidated on password change

Existing active sessions were not invalidated when a user changed their password, allowing an attacker who had obtained an older session token to maintain access.

Remediation: All active sessions for the affected user are now invalidated immediately upon password change or reset.

MediumF-004Configuration
CVSSv3: 4.7CWE-829Resolved

Missing subresource integrity on one third-party script

A third-party analytics script loaded without Subresource Integrity (SRI) hash, meaning a compromised CDN could deliver a modified script.

Remediation: SRI hash added. Script moved to self-hosted copy. CSP updated to restrict external script sources.

LowF-005TLS/Cryptography
CVSSv3: 3.7CWE-326Resolved

TLS 1.2 CBC cipher suite reachable via fallback

A legacy CBC-mode cipher suite in the TLS 1.2 fallback configuration could be negotiated by older clients, reducing forward secrecy guarantees for those connections.

Remediation: All CBC-mode cipher suites removed from TLS 1.2 configuration. Only ECDHE+AESGCM and CHACHA20 suites accepted.

Security hardening

Hardening checklist

TLS 1.3 enforced; TLS 1.2 with restricted cipher suites only
HSTS preload with 1-year max-age
Content Security Policy (CSP) with strict-dynamic
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy restricting camera, microphone, geolocation
CORS restricted to application origins only
Rate limiting on all authentication endpoints
Brute-force protection with account lockout
Session tokens rotated on privilege change
Subresource Integrity (SRI) on all third-party scripts
DNS CAA records restricting certificate issuance
Certificate Transparency monitoring
Automated dependency vulnerability scanning (CI/CD)
Container image scanning before deployment

Responsible disclosure

Found a vulnerability?

We welcome responsible disclosure from security researchers. If you discover a vulnerability in the Gatekeeper platform, please report it privately to our security team. We commit to acknowledging your report within 24 hours, providing an initial assessment within 72 hours, and crediting your contribution.

We will not pursue legal action against researchers acting in good faith who do not access customer data beyond what is necessary to demonstrate the vulnerability and who provide us reasonable time to remediate before public disclosure.

PGP key available on request.

Want the full report?

The complete pentest report including all findings, reproduction steps, scanner output, and auditor certification is available under NDA to qualified prospects and existing customers.

Security One-Pager

Cookie Preferences

We use cookies to ensure the platform works correctly, remember your settings, and improve your experience.

© B-Brave Gatekeeper 2026