Like most security firms, we often start relationships with full stack audits. We also have enough experience in this industry to admit another firm will find bugs we missed, and vice versa. Our true goal in audits is to understand your threat model and find a path to fundamentally remove entire classes of relevant attack surface.
We tend to start with a consultation where try to help you understand your true attack surface by answering tough questions:
- Can your Google Authenticator codes be phished?
- Can your SMS 2FA solution be SIM Swapped?
- Can someone tamper with your Git repos or CI/CD systems?
- Would it be profitable for someone to buy a $50,000 0day to compromise employee devices?
- What happens when the FedEx guy leaves a tampered USB C cable on a conference table?
- Who reviews the code of your third party dependencies?
- What happens when your IT administrator is compromised? Or a production engineer?
- Can a change in local political landscape fundamentally halt your business?
- Can someone buy a server next to yours and steal your secrets via a side channel attack?
- How do know the offline laptop with the keys to the kingdom has not been tampered with?
- Do you have a plan for <i>when</i> your production systems are compromised?
---
## Values
### Distrust
- We will never ask you to give us access to production systems or have any power over your org.
- Anyone with access to significant value is at personal risk. We teach distrust to protect people.