Frequently Asked Questions

Find answers to common questions about our cybersecurity services and solutions.

Do I need to give access to our code base?

No. We do not need access to your code base. We can find vulnerabilities without that access by monitoring the API calls your app makes, which is sufficient for our comprehensive security analysis.

My code base is in Python, can you work with Python?

Yes, the programming language or your tech stack is immaterial to us. Since we don't need access to your code base, we can work with any technology stack. We monitor API calls and perform security analysis regardless of the underlying technology.

How long does it take you to verify a fix to your reported bug?

Within minutes. We have dedicated security staff monitoring bug reports, and our experts can verify fixes quickly and inform you immediately if the remediation is successful.

Can we get a refund if we discontinue with the service?

Yes. We offer refunds for the remaining months of your subscription if you decide to discontinue our service. Please refer to our refund policy for complete details.

Your plan is too costly for us, can we negotiate?

Our pricing is standardized. However, if you are a bootstrapping startup, please reach out to us at [email protected] and we will work something out to support your growth.

What types of security vulnerabilities do you detect?

We detect a wide range of vulnerabilities including SQL injection, XSS, authentication bypasses, logic flaws, payment vulnerabilities, data leaks, API security issues, mobile app vulnerabilities, and open-source component vulnerabilities.

How often do you provide security reports?

For our Standard plan, we provide weekly security reports. Enterprise customers receive on-demand reporting with real-time alerts for critical vulnerabilities. All reports include detailed findings, risk assessments, and remediation guidance.

Do you provide compliance reporting?

Yes, we provide compliance reporting for various standards including PCI DSS, SOC 2, GDPR, and other regulatory requirements. Our reports help you meet audit requirements and maintain compliance standards.

Still have questions?

Our security experts are here to help. Get in touch with us for personalized assistance with your cybersecurity needs.