Penetration testing for SaaS — $3,499 to $5,499. Public pricing. No procurement.

Credentialed engineers test your web app, APIs, mobile, or network surface. OWASP WSTG / MASVS / API Security Top 10 methodology, CVSS 4.0 scored findings, signed PDF in 15 days (Essential) or 30 days (Complete). Stripe checkout, no discovery calls, no quotes-by-email theater.

  • 20+ Engagements
  • 57 Reports Delivered
  • OWASP-Aligned Methodology

Coverage

Web, APIs, mobile, network — manual, by credentialed engineers.

Automated scanners catch the bugs they were built to catch. The other 70% — broken access control, IDOR at scale, business logic flaws, authentication bypass — requires a credentialed engineer who has seen the pattern before. Our coverage spans the full attack surface a determined attacker would explore.

Web Applications

Authenticated and unauthenticated testing across web app surface — login flows, session management, input validation, business logic, broken access control. OWASP WSTG-aligned, ~82 OWASP-aligned checks per engagement.

Common finding: Recent: nearly 1 in 3 web apps we audit are missing X-Frame-Options — clickjacking-exposed session interfaces with one-line fix.

APIs

REST + GraphQL endpoint testing — broken object-level authorization (BOLA), broken function-level authorization (BFLA), excessive data exposure, security misconfiguration. OWASP API Security Top 10 aligned.

Common finding: Recent: BOLA on /users/{id}/profile endpoints — incrementing id returns other tenants' data. Common pattern in multi-tenant SaaS.

Mobile (iOS + Android)

OWASP MASVS / MASTG-aligned testing — runtime tampering, jailbreak/root detection, certificate pinning, local data storage, insecure communication. Tested on real devices, not emulators alone.

Common finding: Recent: every mobile app we've tested runs unmodified on rooted/jailbroken devices — local credential theft via Frida hooking is the typical exploit path.

Network + Infrastructure

External-facing services, exposed admin interfaces, TLS configuration weakness, weak authentication on management protocols. Internal network testing available in Custom tier.

Common finding: Recent: exposed administrative ports (SSH, RDP) accessible from 0.0.0.0/0 — direct path to compromise on misconfigured cloud deployments.

Multiple asset types in a single engagement? Complete tier covers up to 3 assets in any combination. Internal network, red team, recurring engagements — Custom.

Pricing

Three tiers. Public pricing. Signed-PDF SLA on every engagement.

Most boutique pen-test firms quote $5,000 to $30,000 for similar scope, gated behind multi-week scoping calls. Ours is published, binding at Stripe checkout, and starts at $3,499. We’ve removed the discovery-call cycle and 6-week kickoff — not the manual testing. Same OWASP-aligned methodology at every tier — same engineer-hours of methodology coverage per asset, same CVSS 4.0 scoring per finding. Tier difference is asset count and scope, not per-asset depth.

Essential

$3,499

Signed PDF in 15 days

1 asset · Web / Mobile / API / Network — your choice

  • Full OWASP-aligned methodology coverage (WSTG / MASVS / API Top 10 — depending on asset)
  • ~82 security checks per engagement
  • CVSS 4.0 vector + score per finding
  • 40-80 page signed PDF report (Description / Impact / Proof-of-Concept / Remediation per finding)
  • 60-day retest included after remediation
Most Popular

Complete

$5,499

Signed PDF in 30 days

Up to 3 assets · Any combination — Web + APIs + Mobile, Web + APIs + Network, etc.

  • Everything in Essential, applied to up to 3 assets
  • 30-minute findings walkthrough call with the engineer who performed the testing
  • Priority scheduling
  • CVSS 4.0 vector + score per finding
  • 60-day retest included after remediation

Custom

Talk to us

Per scope

Internal network · Red team · Social engineering · Recurring engagements · Complex multi-asset scope

  • Custom methodology + scope per engagement
  • Internal-network testing
  • Red team / social engineering exercises
  • Recurring engagement options (quarterly / semi-annual / annual)
  • CVSS 4.0 vector + score per finding

Each engagement signed by the credentialed engineer who performed the testing. eMAPT · eWPT · CEH (renewed) · banking-sector experience.

View sample Pen Test report →

Inside the signed PDF

Description, Impact, Proof-of-Concept, Remediation. Per finding.

A pen test report is only as useful as the actions a security team can take from it. Every finding in our signed PDF includes the technical description, the business impact specific to your context, a reproduction path with screenshots and curl commands, and operationally-aware remediation that addresses CDN/WAF layers, legacy partner compatibility, and rollout strategy — not just “set this header.”

Medium WEB-001

X-Frame-Options header missing on authenticated session pages

example.com/dashboard, example.com/account/* · CVSS 4.0: 6.4 (Medium)

Vector: AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N

Description

The application’s authenticated pages do not return an X-Frame-Options or frame-ancestors CSP directive in HTTP responses. This permits any external domain to render the application within an <iframe>, enabling clickjacking attacks against authenticated user sessions.

Reproduction

  1. Authenticate to https://example.com
  2. Navigate to https://attacker-controlled.example/clickjack-poc.html (HTML payload below renders example.com/dashboard in transparent iframe)
  3. Click coordinates align with “Confirm transfer” button on dashboard
  4. Click is hijacked; transaction submitted without user awareness
<html><body>
  <iframe src="https://example.com/dashboard"
          style="opacity:0.0001;position:absolute;top:0;left:0;
                 width:100%;height:100%"></iframe>
  <button style="position:absolute;top:200px;left:300px">
    Click to claim
  </button>
</body></html>

Tested in Firefox 119 and Chrome 120 — clickjacking exploit confirmed on session pages without SameSite=Strict on auth cookies. Modern browser hardening (Chromium pointer-events on opacity:0 iframes) varies; some configurations require clip-path or partial opacity adjustments to land the click. Effective remediation requires both frame-ancestors header AND SameSite cookie hardening — neither alone fully closes the gap.

Impact

Authenticated session UI surfaces are exposed to clickjacking. For applications handling financial transactions, account modifications, or sensitive data submission, a user can be tricked into submitting attacker-controlled actions while authenticated. Severity rating considers the application’s specific UI flow.

Remediation

The simple fix is two headers, not one. The operationally-correct fix is layering header enforcement with cookie hardening:

X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'

Modern browsers prefer CSP frame-ancestors and treat X-Frame-Options as legacy fallback. Set both to cover modern + older browser fleets:

  • Modern (Chrome 76+, Firefox 70+): frame-ancestors takes precedence
  • Legacy (older Edge, IE compat-mode): X-Frame-Options is honored

App-layer enforcement (Express / Django / Rails middleware):

  • Wins on simplicity, breaks if any partner needs iframe embedding
  • Use when: no embed integrations exist or are planned

Edge enforcement (CDN / WAF / reverse proxy):

  • Wins on consistency across multi-service deployments
  • Use when: multiple backend services serve the same user-facing domain

Roll out CSP in report-only mode first to surface unexpected embeds:

Content-Security-Policy-Report-Only: frame-ancestors 'none';
  report-uri /csp-report

Pair with SameSite cookie hardening as defense-in-depth — even if framing succeeds, SameSite=Lax/Strict prevents authenticated state-changing requests from cross-origin contexts:

Set-Cookie: session=...; SameSite=Strict; Secure; HttpOnly

Verify

Test the authenticated route with the session cookie attached:

curl -I -b "session_cookie=<value>" https://example.com/dashboard \
  | grep -iE "x-frame-options|frame-ancestors"

Should return both:

X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'

Validate cookie hardening separately:

curl -I -b "session_cookie=<value>" https://example.com/dashboard \
  | grep -i "set-cookie"

Should show: SameSite=Strict (or Lax for cross-site flows where Strict breaks legitimate functionality).

Real-context business impact, not generic.

Every finding’s impact section is written for your application’s specific UI and data flow — not template-copied from a CWE entry.

Reproduction with screenshots + curl.

Auditors and your engineering team can both reproduce the finding from the report alone. No “see attached video” or “engineer will demonstrate.”

Operationally-aware remediation.

App-layer vs edge-layer trade-offs, legacy compatibility considerations, rollout strategies. Written by people who have shipped these fixes, not just identified the bug.

Methodology

OWASP-aligned. Phase-driven. ~82 checks per engagement.

Pen tests are only as good as the methodology behind them. Ours is anchored to industry-standard frameworks — OWASP Web Security Testing Guide (WSTG), Mobile Application Security Verification Standard (MASVS), and API Security Top 10. Phase-driven testing means every engagement covers the same depth dimensions; tier difference is asset count, not methodology.

Web tier

Web Security Testing Guide

~82 web security checks per engagement, mapped to the OWASP WSTG control catalog. Phases: reconnaissance → authentication → session management → input validation → error handling → cryptography → business logic → reporting.

Mobile tier

Mobile MASVS + MASTG

Mobile-specific testing per the OWASP Mobile Application Security Verification Standard. Coverage: storage, cryptography, authentication, network, platform interaction, code quality, resilience to runtime tampering. Tested on real devices, not emulators alone.

API tier

API Security Top 10

REST + GraphQL endpoint testing aligned to the OWASP API Security Top 10. Particular focus on Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) — the two highest-impact API vulnerability classes in multi-tenant SaaS.

Posture: white-box and grey-box. We work with whatever access level your engineering team can provide — production-equivalent staging credentials, source code access, architecture documentation. More access produces deeper findings. Black-box testing available in Custom tier.

CloudCheck 360° methodology applies to Manual Cloud Audit. That methodology covers cloud configuration audit at the manual depth tier — it’s a different product. See methodology →

Pricing math

$3,499 isn’t cheap. It’s productized.

Industry pen test pricing for similar scope runs $5,000 to $30,000, with $15,000 a common midpoint. Most of that cost isn’t testing — it’s the operational overhead of how the engagement is sold and managed. We’ve removed the overhead, kept the testing.

Methodology is identical at every tier — same OWASP coverage, same ~82 phase-driven security checks per asset, same credentialed pen testers, same signed-PDF deliverable with CVSS 4.0 vectors per finding. Time budget is calibrated to scope: Essential is right-sized for one focused asset; complex multi-asset scope goes to Complete or Custom. We’re not cheaper because we test less — we’re cheaper because we don’t bill for procurement theater.

Component

Pricing transparency

Industry

“Contact us” gates, custom quotes per buyer

Cloud Upload

Public pricing on site, binding at Stripe

Component

Scoping

Industry

2-4 week discovery + scoping cycle

Cloud Upload

5-minute scoping form (Custom: scoping call)

Component

Procurement

Industry

NET 30 invoicing, MSA + SOW negotiation

Cloud Upload

Stripe checkout

Component

Project management

Industry

Dedicated PM, weekly status calls (Custom tier: included; Essential/Complete: async)

Cloud Upload

Engineer-direct delivery, async status updates

Component

Credentialed engineers

Industry

Often delegated to junior engineers on cheaper tiers

Cloud Upload

Same credentialed pen tester on every engagement — eMAPT, eWPT, CEH, banking-sector experience

Component

Testing depth per asset

Industry

Calibrated per scope

Cloud Upload

Calibrated per scope — Essential per-asset depth = Complete per-asset depth

Component

What's the same

Industry

Manual testing, OWASP methodology, signed deliverable

Cloud Upload

Manual testing, OWASP methodology, signed deliverable

Every engagement — Essential through Custom — run by the same credentialed pen tester. eMAPT (Mobile App Pen Testing Professional), eWPT (Web App Pen Testing Professional), CEH v11 (EC-Council, renewed). 5 years pen testing critical banking systems — Web Applications, Mobile Applications, API Gateways, ATM. Active HackerOne researcher with bountied vulnerabilities. No junior delegation, no offshore handoff.

See team and credentials →

Audit fit

Pen test reports auditors accept as evidence.

Most pen tests are bought because an auditor or customer asked for one. Our reports are structured for that use case — clear scope, severity-grouped findings, per-finding evidence and remediation, signed by the credentialed engineer who performed the testing.

What’s in the report — engineered for audit handover.

  • Executive summary in plain English.

    1 page, written for non-technical reviewers — what was tested, what was found, what the business risk is.

  • Findings inventory grouped by severity.

    Critical / High / Medium / Low / Informational, each with finding ID, title, affected assets, and CVSS 4.0 score.

  • Reproduction per finding.

    curl commands, request/response payloads, screenshots — reviewers can independently verify without contacting the engineer.

  • Operationally-aware remediation.

    App-layer vs edge-layer trade-offs, legacy compatibility, rollout strategy — not just “set this header.”

  • 60-day retest as separate signed PDF.

    Closure evidence after remediation lands — same format, marked “retest,” signed by the same engineer.

Why auditors accept our reports.

  • Signed by named engineer.

    Each report carries the credentialed engineer’s name and credentials. Auditors verify the signature; we provide credential verification on request.

  • CVSS 4.0 vectors per finding.

    Severity ratings include the calculation vector — defensible against challenge from CISSP-level reviewers.

  • Structured evidence package.

    Description / Impact / Proof-of-Concept / Remediation per finding — drop directly into auditor-readable evidence package.

  • 60-day retest included.

    Auditors expect remediation verification. Retest report becomes evidence of closure.

Common questions

Quick answers.

Vulnerability scanning is automated tool execution — Nessus, Qualys, Burp scanners running known checks at machine speed. Penetration testing is manual — a credentialed engineer chains vulnerabilities, exploits business logic, and tests authentication flows that automated scanners can’t reach. Both have a place. Most SaaS companies need scanning continuously (CI/CD-integrated, monthly tool runs) AND pen testing periodically (annual, post-major-release, compliance-driven). Cloud Upload’s $0 / $499 tiers cover the configuration scan layer for cloud and web; pen tests cover the manual depth layer.

Methodology is identical — same OWASP coverage (Web Security Testing Guide, Mobile MASVS, API Security Top 10), same credentialed pen testers (eMAPT, eWPT, CEH, banking-sector experience), same signed PDF deliverable with CVSS 4.0 vectors and Description / Impact / Proof-of-Concept / Remediation per finding. Time budget is calibrated to scope. Essential ($3,499) is right-sized for one focused asset — full methodology coverage on one Web app, one Mobile app, one API, or one network surface. Complete ($5,499) extends the same methodology coverage to up to three assets in any combination. Custom is for complex scope — internal networks, red team, recurring engagements. The cost difference vs $5,000-$30,000 industry firms isn’t depth — it’s overhead. Public pricing replaces 2-4 weeks of “contact us” discovery cycles. Stripe checkout replaces NET 30 invoicing and MSA negotiation. Engineer-direct delivery replaces dedicated PM and weekly status calls. We’re cheaper because we don’t bill for procurement theater — not because we test less. Same engineer, same methodology, same deliverable. The price math is operational, not depth-based.

Cloud Upload’s pen tests are publicly priced: $3,499 for Essential (1 asset, web/mobile/API/network), $5,499 for Complete (up to 3 assets in any combination), and Custom for larger scope (internal network, red team, recurring engagements). Most boutique pen-test vendors quote $5,000–$30,000 for similar scope and require multi-week scoping calls before pricing. Our pricing is binding, payable via Stripe, with a 15-day SLA from scope-lock for Essential and 30-day SLA for Complete.

Every Cloud Upload pen test includes: authenticated and unauthenticated testing of your in-scope assets, OWASP-aligned methodology (WSTG for web, MASVS for mobile, API Security Top 10 for APIs), business-logic and access-control review, a 40–80 page signed PDF report with executive summary, findings inventory, evidence, CVSS 4.0 scoring, and remediation guidance. Complete tier adds a 30-minute walkthrough call with the engineer who performed the testing. All tiers include a 60-day retest.

Cloud Upload’s SLA is 15 days from scope-lock to signed PDF delivery for Essential, 30 days for Complete. Scope-lock happens immediately after Stripe checkout. The window includes testing, validation, and report drafting by credentialed engineers. Custom-tier engagements (internal network, red team, recurring) are scoped per engagement.

SOC 2 Trust Services Criteria do not explicitly mandate a penetration test. Most auditors expect periodic vulnerability assessment as evidence for CC7.1 (vulnerability identification + monitoring) and CC7.2 (security event detection), and pen testing is the most-accepted form of that evidence at audit time. Cloud Upload pen test reports do not ship with explicit SOC 2 framework mapping in the deliverable — auditors typically reference the report’s findings, methodology, and credentialed signatory directly.

Our reports are 40–80 pages depending on scope and findings. Structure: executive summary (1 page), scope and methodology (2–3 pages), findings inventory grouped by severity (10–60 pages depending on findings count), evidence per finding (screenshots, payloads, request/response samples), CVSS 4.0 vectors per finding, and remediation guidance. Reports are signed by the credentialed engineer who performed the testing. A sanitized sample report is available — request via the scoping form.

Yes. The Complete tier covers up to 3 assets in any combination — for example, a web app + its API + the mobile app that consumes the API. Custom tier handles larger combinations or scopes that include internal network testing, red team / social engineering exercises, or recurring engagements (quarterly / annual). For combinations beyond 3 assets but without internal network or red team, the scoping flow will recommend the right tier.

Industry surveys cite $5,000 to $30,000 as the typical range for a manual penetration test, with $15,000 as a common midpoint. Cloud Upload’s Essential tier at $3,499 sits below this floor — not because we cut corners, but because we’ve productized the engagement: no discovery-call cycle, no 6-week kickoff, no NET 30 invoicing. Our Complete tier at $5,499 still sits below the typical range. The difference is operational efficiency, not testing depth — every engagement is manual, executed by credentialed engineers, signed and delivered as a 40–80 page PDF report.

Most boutique pen-test firms quote on a project-fee basis, not hourly — typical project fees range from $5,000 to $30,000 depending on scope. Hourly rates inside those projects, when surfaced, run $200–$400/hour for senior credentialed testers. Cloud Upload’s flat-fee model ($3,499 / $5,499 / Custom) replaces the hourly question entirely: you pay a fixed price, you get a fixed scope, you receive a signed report in 15 days (Essential) or 30 days (Complete). No hourly tracking, no scope-creep billing, no surprise invoicing.

Yes. Every engagement — Essential through Custom — runs by the same credentialed pen tester. Credentials: eMAPT (Mobile App Penetration Testing Professional), eWPT (Web App Penetration Testing Professional), CEH v11 (EC-Council, renewed). 5 years of pen testing critical banking systems — Web Applications, Mobile Applications, API Gateways, ATM. Active HackerOne researcher with bountied vulnerabilities. No junior delegation, no offshore handoff. See team and credentials at /team.

Still have questions? Talk to the Team →