Pricing

Investment Guide

Every engagement is scoped to your product and compliance needs. The examples below illustrate typical costs for common scenarios.

Example Scenarios

Three real-world scenarios showing how scope determines cost.

How pricing works: Our assessments are scoped individually based on the number of endpoints, codebase size, compliance requirements, and depth of review. The figures below are representative examples -- your actual cost will reflect the specific scope of your engagement. Contact us for a tailored quote.
Scenario 1

Endpoint Security Audit

From $4,500
Example

A software vendor with a single HTTPS endpoint (update server, version API, or download site) needs TLS validation and a penetration test report for an enterprise customer's procurement review.

  • TLS/SSL configuration audit
  • Security headers assessment
  • Port scan and service enumeration
  • Certificate chain verification
  • Response content analysis
  • SPA/JavaScript analysis (API discovery, secret detection)
  • Backend API discovery and CORS testing
  • XSS testing and path traversal testing
  • Certificate Transparency log search
  • Penetration test report with findings
Cost factors

Number of endpoints, server complexity, whether client-side binary validation is included.

Scenario 3

Comprehensive Assessment

From $18,000
Example

A software vendor providing source code access for static analysis needs a full-depth assessment including SAST review, runtime verification, and ongoing support through their customer's procurement cycle.

  • Everything in Security Assessment
  • Static Application Security Testing (SAST)
  • Credential and authentication strength testing (hydra)
  • Client-side testing via mitmproxy
  • Manual authentication and session testing
  • Manual authorization and IDOR testing
  • Manual CSRF testing
  • Manual API input validation testing
  • Dynamic runtime verification
  • SAST findings triage and remediation guidance
  • Threat model, compliance mapping, and remediation verification plan
  • Ongoing procurement support
  • Assessment updates as findings are remediated
Cost factors

Codebase size and language, number of platforms (Windows, Linux, macOS), depth of SAST triage, duration of procurement support period.

What Determines Your Cost

The final price reflects the actual scope and effort required for your specific engagement.

Test Spectrum

Which assessment areas apply -- endpoint testing only, or full SDLC + security program + SAST + verification. You choose what you need.

Product Complexity

Number of endpoints, codebase size, supported platforms, third-party dependencies, and build pipeline complexity.

Compliance Needs

Whether you need SOC 2, ISO 27001, or custom questionnaire support, and how many customer questionnaires need responses.

Source Access

SAST requires source code access and adds significant review and triage effort. Assessments without source access are scoped accordingly.

Number of Products

Assessing multiple products or releases in the same engagement may qualify for reduced per-product pricing.

Ongoing Support

One-time assessment vs. ongoing relationship with assessment updates as you remediate findings and release new versions.

Add-Ons

Available with any tier. Add individual services to match your specific needs.

SBOM Generation $400

CycloneDX/SPDX bill of materials for all product dependencies with version tracking and license identification.

SAST Integration $800

Integrate static analysis into your existing build pipeline as an automated security gate.

Secrets Scan $300

Full git history scan for leaked credentials, API keys, and tokens with remediation guidance.

Remediation Verification $250

Re-scan after you fix findings to confirm vulnerabilities are resolved. Updated report provided.

Questionnaire Response Only $1,500

Draft enterprise security questionnaire responses based on your product documentation -- no penetration test required.

Manual Testing Package $2,000

Manual authentication, authorization, session, and business logic testing for web applications and APIs. Includes IDOR, CSRF, and input validation testing.

Our methodology: Our assessments cover reconnaissance, scanning, vulnerability identification, and limited exploitation proof-of-concept (SQL injection data extraction, credential cracking). We identify and document vulnerabilities with evidence and severity ratings. We do not currently perform persistence testing, social engineering, internal network testing, denial of service testing, or physical security testing. If your procurement process requires these capabilities, contact us to discuss options.

Get a Tailored Quote

Tell us about your product, your endpoints, and what your customers are asking for. We will scope an engagement and provide a fixed-price quote.