top of page


The source code audit must make it possible to avoid information leaks and operating alterations. The following parts of source code will be particularly tested:

  • authentication, user management, resource access control, exchanges with the information system,

  • compliance with predefined security requirements,

  • as well as the most widespread vulnerabilities: CSS, SQL injections, CSRF...


For our code audits, we use the YAG suite solution from Y agaan , an innovative solution that combines machine learning and code analysis.

The code analysis takes place over 10 days. Our bias is to see what a CyberSecurity engineer can find in a week.



For an effective code analysis, it is necessary to have defined a delimited and coherent target. If it is too broad, the result of the analysis may not be relevant.


Functional set

5000 € 

bottom of page