Role-matrix coverage
Test every documented role against every protected resource.
Real users, real roles, real privilege boundaries. We test what a low-privilege account, a compromised tenant, or a misused role can actually do — which is where most real breaches live.
Test every documented role against every protected resource.
Cross-tenant IDORs, exported reports, shared links, webhooks, integrations.
Vertical (user → admin) and horizontal (user A → user B) paths.
Hidden admin endpoints, debug routes, role-aware features called by lower roles.
Anti-automation, financial-logic abuse, referral and free-trial misuse.
Assertion handling, replay, role-claim manipulation, downgrade bypasses.
You provide test accounts for each role and tenant. We confirm coverage on the call.
Each role tested against every protected resource. Cross-tenant where applicable.
Privilege escalation, hidden admin endpoints, role-aware features called by lower roles.
Live finding walkthrough with the engineering team. Retest of reported findings after fixes, included in scope.
Validate that one tenant cannot reach another tenant's resources, exports, or webhooks.
Owner, admin, member, viewer, billing, support — every role tested against every feature.
A new feature added new permissions; the role matrix has not been re-validated yet.
Web application testing →
Cover the unauthenticated and surface layer of the app too.
API testing →
Test the API role boundaries the SPA depends on.
Compliance pentest →
Map findings to SOC 2, ISO, PCI, HIPAA in one report.
Red team operations →
If you want to test detection of role abuse end-to-end.
A pentest performed with valid credentials in the application — typically across every role you ship. The goal is to find issues inside the trust boundary: horizontal and vertical privilege escalation, tenant-isolation gaps, and abuse of role-specific features.
Most real breaches involve compromised or low-privilege credentials, not unauthenticated access. Authenticated testing surfaces the issues a stolen, phished, or low-tier account could exploit — which are usually higher-impact than perimeter findings.
We work from a documented role matrix you supply (or we draft on the scoping call). For every role and tenant in scope you provide a test account; we test each account against every protected resource.
Yes. We test SSO flows for assertion handling, replay, role-claim manipulation, and session-binding issues — and verify that downgrade or local-login bypasses do not exist.
It can be either. Most web app pentests already include authenticated testing for the documented roles. A standalone authenticated pentest goes deeper into role-matrix coverage, abuse cases, and multi-tenant scenarios.
A 30-minute review with our lead pentester. No slides, no pitch — we look at what you have, tell you what we would test first, and give you a fair scope and timeline.