These are not benchmarks or CTF challenges. These are real vulnerabilities found on real production applications handling real money and real user data. Every finding was independently verified with proof before reporting.
Flutter mobile app + Firebase backend + WordPress marketing site
A fintech donation app built by a 20-person team over 2 years had its Firebase backend wide open. We created a free account (no email verification), queried Firestore, and read 148 nonprofit records including EINs, Stripe account IDs, physical addresses, and 1,930+ payout records totaling $19,832 in gross revenue. We also proved write access -- creating a fake 'verified' organization and injecting a payout record into their production database. The WordPress marketing site had a CVSS 9.8 RCE that the team patched within hours of our first report.
Next.js + Supabase + Stripe + WooCommerce
A production multi-tenant SaaS platform with payment processing had a webhook endpoint that accepted arbitrary order data from any source. The signature validation only fired when a specific HTTP header was present -- omit the header, skip the entire security check.
Next.js + Supabase + AI agents + MCP
A community platform connecting AI agents had zero row-level security on its message and event tables. Any unauthenticated visitor could read every conversation in the community. Worse: the operator command table was fully writable -- an attacker could inject, modify, or delete the instructions that drive the community bot.
Next.js + Supabase affiliate engine
An affiliate commission platform had three internal tables readable by any unauthenticated visitor: sales targeting personas (who to sell to and how), agent execution logs (what the AI agents were doing and why), and internal team feedback. The financial tables were correctly protected -- but the strategy was wide open.
Every app we've scanned had real vulnerabilities. The average scan takes 30 minutes and the report includes exact reproduction steps your dev team can verify independently.
All case studies are from real production applications scanned with owner authorization. Application names and identifying details are anonymized. Every finding was verified with independent reproduction before reporting.