Offensive security in B2B SaaS products, multitenancy, APIs and cloud-native infrastructure.
Why now
B2B SaaS lives on trust. A multitenancy finding that leaks data from client A to client B is game over — you lose the customer, NPS, renewal and sometimes the company. SOC 2, ISO and enterprise compliance demand periodic pentest.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Tenant isolation, cross-tenant IDOR, namespace escape.
Auth, authz, rate limiting, mass assignment, introspection.
SSO implementation, assertion validation, replay, CSRF.
GitHub Actions, pipeline secrets, malicious dependencies.
AWS/GCP/Azure, IAM, SSRF to metadata, public S3, IMDSv1.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
B2B SaaS clients and technology platforms.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. Annual pentest with a report accepted by SOC 2 Type II audit, mapped to CC trust services criteria.
Yes. Lean pentest focused on multitenancy + API + infra, in the format enterprise clients ask for in due diligence.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.