Written report
Executive summary, methodology, finding catalog, severity, exploit path, business impact, remediation steps, retest checklist. PDF and markdown, your choice.
No matter the service: a written report, working proof of concept, an engineer readout, retest, attestation, and source materials. Below: what each one is and what to do with it.
The six standard deliverables.
Executive summary, methodology, finding catalog, severity, exploit path, business impact, remediation steps, retest checklist. PDF and markdown, your choice.
Reproducible exploit code, payload files, or step-by-step instructions. Your engineers can verify every finding before they triage it.
60 to 90 minutes, live, with your engineering team. Walk every finding. Answer questions. Agree on remediation order before the call ends.
One round of post-fix retest, scheduled within 30 days. Findings marked resolved, partially resolved, or open with notes. New report appended.
Signed by the engineer who ran the test. For SOC 2 auditors, customer security teams, insurance underwriters, regulators. One page.
Markdown source of every finding, requests / responses captured, tool output where relevant. Useful for adding to your wiki or training the next engineer.
When each deliverable lands.
Report quality benchmarks.
Not just CVSS. We rate exploitability against your environment, your data, your customers. A high-CVSS finding in an unreachable code path may be medium for you.
If we say it works, the PoC works on the version we tested. We pin commit hashes, model versions, configuration state.
Not "consider implementing input validation." Specific code-level recommendations, with examples in your language and framework.
Each finding has an ID, a timestamp, a methodology reference, and a re-test status. Drop directly into your GRC tool.
Format options we offer on request.
Every finding as a standalone markdown file with frontmatter. Drop into Notion, Confluence, Linear, Jira.
A redacted version suitable for sharing with your enterprise customers under NDA. Removes internal-only context.
Three-to-five-page write-up for the board or audit committee. Strategy and trends, not tooling.
For finance, healthcare, or critical-infrastructure clients, formatted to the regulator template you use.
Deliverables FAQ.
Yes. The list above is the default. Customer-facing summary, board narrative, regulator format are common adds. Removals are rarer (the report and PoCs are not removable).
Yes. Markdown source is included by default; PDF is templated to our format unless you ask for yours.
Seven years by default, encrypted at rest in a single-tenant environment. Deletable on request after a project, subject to legal hold.
Yes. Linear, Jira, GitHub Issues, ServiceNow. We can post each finding as a ticket with the correct project, label, and assignee.
It happens. We rerun the PoC with you on the call, and if the finding is invalid, we mark it withdrawn in the final report. We do not pad the catalog.
The format auditors and engineering teams have been accepting since 2019. Download the latest version, or ask for a redacted real-engagement copy under NDA.