01
Inventory
We map every tool, resource, prompt, and integration the agent can reach. No inventory, no engagement — this is where most teams discover they own more surface than they thought.
02
Threat Model
A short, written document: who's the adversary, what are they after, and where are they likely to get in. We keep it small enough to read in a sitting and alive enough to update as the product moves.
03
Manual Review
Senior engineers read the code. Tool handlers, authorization layers, session plumbing, logging paths. Probe runs in parallel to catch mechanical regressions.
04
Adversarial Probing
We test the assumptions — authorization boundaries, prompt injection surfaces, cross-tenant paths. Reproducible, ranked, written up.
05
Fix Plan
Every finding ships with a remediation. For Sprints we go further: we ship the fix, with your team, in your repo.
06
Hand-off
You leave with a threat model your engineers maintain, invariants enforced in CI, and an authorization layer that's documented, tested, and yours.