EresusSecurity
Anonymized commercial proof

Case studies and proof stories

Eresus case studies show the problem, test approach, risk class, business impact, and closure path without exposing real customer names. The goal is to prove security methodology, not publish sales claims.

Names and exact environments stay redacted for operational security.
Each study maps challenge, validation approach, finding class, and closure path.
Commercial pages link back to relevant proof so buyers can evaluate methodology, not slogans.
Financial Services

FinTech API Platform

API Security + Cloud Review
Critical chain closed

Challenge

A multi-tenant payment workflow needed validation beyond automated API scanning.

Approach

Tested BOLA/IDOR, JWT boundaries, OAuth assumptions, webhook integrity, IAM exposure, and cloud storage paths together.

Outcome

Found an auth bypass chain that could expose sensitive customer records and converted it into developer-ready remediation steps.

View related service
AI / SaaS

AI Agent Product Team

AI Agent + MCP Security
Release risk reduced

Challenge

An agentic workflow could call internal tools, retrieve documents, and trigger production actions.

Approach

Validated prompt-to-action paths, MCP registration assumptions, tool scopes, approval boundaries, memory, and retrieval abuse.

Outcome

Mapped unsafe tool chains and delivered guardrail, permission, and approval-flow changes before public release.

View related service
Technology

Cloud-Native SaaS

Kubernetes + DevSecOps
Attack path removed

Challenge

The team needed to understand whether Kubernetes and CI/CD misconfigurations could become a real compromise path.

Approach

Reviewed RBAC, service accounts, ingress, secrets, registry trust, GitOps, and pipeline credentials as one attack graph.

Outcome

Prioritized the cluster risks that enabled lateral movement and turned them into hardening and release-gate controls.

View related service
B2B SaaS

Product Engineering Team

Secure Software Development
Secure SDLC adopted

Challenge

A fast-moving roadmap had accumulated auth, tenancy, dependency, and release-process security debt.

Approach

Combined architecture review, secure code review, CI/CD controls, and targeted offensive validation for critical flows.

Outcome

Created a secure delivery roadmap that engineering could adopt without splitting delivery and security into separate tracks.

View related service