Skip to main content
MemCyber

Case Studies

Six engagements. Six industries. Zero unresolved criticals.

Client names are anonymized by default — NDAs come first. Each summary below is a real engagement. Named references, detailed reports, and retest artifacts are available to qualified prospects on request.

Licensed European Sportsbook

3w
iGaming Web App + API Pentest EU
2 Critical 4 High 7 Medium 13 total

Grey-box assessment against a high-traffic sportsbook. Critical IDOR chain on wallet endpoint allowed balance manipulation across tenants.

Outcome

Prevented cross-tenant balance manipulation at scale. All critical and high findings patched within 30 days; retest closed with zero outstanding issues.

Read full case study

DeFi Lending Protocol

4w
Web3 / DeFi Smart Contract Audit
1 Critical 3 High 5 Medium 9 total

Solidity audit of a lending market. Identified a rounding-direction flaw that let attackers drain dust from liquidation rewards across positions.

Outcome

Protocol launched to mainnet with zero post-launch incidents. Fix verified via Foundry invariant suite, saving an estimated six-figure exploit loss.

Read full case study

African Fintech Neobank

12w
Fintech Continuous Bug Bounty Sub-Saharan Africa
3 Critical 6 High 11 Medium 20 total

Ongoing private engagement on consumer banking stack. Discovered KYC bypass via predictable document ID, plus card-tokenization scope confusion.

Outcome

Client cleared SOC 2 Type II observation on vulnerability management using our reports as audit evidence. Estimated 6-week remediation saved vs. comparable incidents.

Read full case study

Southeast Asian Investment App

2w
Fintech API Security Testing SEA
1 Critical 5 High 8 Medium 14 total

REST + WebSocket assessment of a retail investment platform. BOLA on portfolio endpoint exposed other users’ holdings; rate-limit bypass on OTP.

Outcome

Critical issues triaged within 48 hours. Public disclosure coordinated 90 days post-fix with zero regulator escalation.

Read full case study

Move-based L1 Protocol

1w
Web3 / Infrastructure Contest Audit
2 Critical 2 High 4 Medium 8 total

Cantina / Sherlock-style contest contribution on a Move-based protocol. Found capability model misuse that allowed unauthorized object mutation.

Outcome

Top-tier finding awarded; issue fixed pre-deployment.

Read full case study

SaaS Compliance Platform

2w
B2B SaaS Source Code Review North America
3 High 9 Medium 12 total

Static review of a Node.js + Postgres compliance product. Surfaced authn primitive misuse, SSRF in import tooling, and dependency confusion risk.

Outcome

Remediation roadmap delivered; client shipped v2 of auth layer within a quarter.

Read full case study

Procurement needs names? We have three you can call.

Procurement or board sign-off usually needs named references. We can connect you to past clients who have given written consent for reference calls.