Aevora

Source Code Security Assessment

Scoping - First Phase

The first phase of scoping focuses on gathering enough detail to propose a timeline and quote. It also captures general information about your environment and engagement to support further communication. The second phase covers more specific technical details, such as target lists, test credentials, and other environment-specific requirements. Once both phases are complete, we review all information, provide a summary of work, and proceed to kick-off the engagement.

This form is submitted securely over an encrypted HTTPS connection. Your privacy is important to us. We understand that you may not be ready to answer certain questions without further discussion, or you may not yet have all the necessary details. That’s completely understandable—please complete the required fields and answer the remaining questions as best you can or as you feel comfortable.

Enter test objectives or leave blank
When would you like this test to be completed?
Does this engagement have a report deadline?
Are there other services that you would be interested in bundling into this engagement?
Are there any compliance requirements?
What type of application is being reviewed?
What backend languages are used?
How large is the codebase?
What version control system is used?
Please check the boxes that apply to your codebase.
Are there existing automated security tools used (e.g., SAST, SCA)? If yes, which?
How will the code be shared for review?
Please feel free to provide a brief overview of the codebase you'd like reviewed. While this is not required at this stage, any details you’re comfortable sharing (such as the app’s purpose and key features) will help us better prepare for next steps and tailor our conversations to your needs.