en

Mobile App Security Outstaff Audit

Client:
A company providing veterinary services through a mobile platform
Industry:
HealthTech / Veterinary services
Focus:
Security audit of the mobile application and AWS before MVP launch
Main challenge:
Check the security level of key assets before release in an outstaffing format.
Market:
International
Key Takeaways
  • Identified dangerous configurations and data leaks
  • Strengthened security before product launch
  • Used manual and automated testing
  • Found 26 vulnerabilities, including 4 critical
  • Delivered a remediation recommendations report
  • 2
    components checked
    26
    vulnerabilities identified
    1.5
    months of project duration
    Mobile App Security Outstaff Audit
    Is there value in a security audit before releasing an MVP? This case study confirms that there is. The company brought a Datami specialist into the developer’s team. He performed a pentest and code review of the mobile application and AWS, identifying critical vulnerabilities and risks for the MVP.

    An international company is developing a mobile service for remote communication between veterinarians and their clients. The platform combines a mobile application with cloud infrastructure.

    Cybersecurity is crucial for the company because the developer’s service processes users’ personal data, and any vulnerability may lead to data leaks, financial losses, or even disrupt the MVP launch.

    Tasks and challenges
    The client was preparing to launch the MVP. To prevent data loss and eliminate financial and reputational risks, it was necessary to conduct an external security assessment of the mobile application and AWS infrastructure.

    The company decided to involve a Datami specialist to obtain an independent evaluation of the risk level and recommendations for its mitigation before the release.
    • Evaluate the security of the AWS infrastructure and the mobile application
    • Conduct a technical review of the code and critical configurations
    • Prepare a detailed report with recommendations for eliminating vulnerabilities
    icon
    Mobile application pentest
    Test the app’s security using automated and manual methods
    icon
    AWS penetration test
    Check the console, servers, and configurations for vulnerabilities
    icon
    Code security audit
    Analyze the software code to identify issues and improve security

    Work in an outstaff format

    The Datami specialist was integrated into the client’s internal team. This cooperation model ensured efficiency and transparent communication: the security assessment was performed without interrupting processes and with full control remaining on the client’s side.

    For the pentest and code security audit, a White-Box strategy was applied. During the project, our expert combined automated tools and manual testing methods to achieve the most accurate and comprehensive result.

    White-box

    White-Box

    Deep testing with full access to the code and configurations to identify vulnerabilities.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations

    Results and recommendations

    To assess the security of the cloud infrastructure and the mobile application, the Datami specialist used a White-Box strategy. 

    During the pentest and code security audit, 26 vulnerabilities of varying severity were identified: 4 critical, 7 high, 11 medium, and 4 low. Both technical issues and configuration errors were discovered, including:

    • data exposure,
    • unsafe settings,
    • incorrect administrator permissions,
    • exposed API keys in the code,
    • outdated, vulnerable modules and libraries,
    • storage of sensitive information in the source code.

    Based on the security assessment, a report describing the risks was prepared. Each vulnerability was accompanied by specific recommendations, including:

    • configuring secure storage of keys in the code,
    • implementing two-factor authentication,
    • strengthening access control for configurations,
    • regularly updating third-party modules.

    Our certificates

    Datami is a cybersecurity firm whose qualifications are confirmed by 26 certifications and international standards. This allows us to perform tasks of varying complexity while complying with security, confidentiality, and ethical practice requirements.
    Key project takeaways

    Thanks to the collaboration with Datami, the client quickly received a full risk assessment and a clear plan for improving security before the MVP release. This will help them successfully pass future audits and strengthen user trust.

    This case study also demonstrates the effectiveness of the outstaff approach to cybersecurity testing: integrating an external specialist into the internal team made it possible to efficiently conduct an independent audit without halting development or expanding the staff.

    Security status
    No expertise
    26 vulnerabilities identified, a report with remediation instructions prepared
    Confidential data
    Risk of leakage
    Recommendations provided on 2FA, access policies, and key storage
    Code protection
    Vulnerabilities and secrets in the code
    Error remediation plan prepared
    More success stories with Datami
    Browse other project case studies
    Azure Audit for a Government Business Platform
    Azure Audit for a Government Business Platform
    • ISO/IEC 27001 and GDPR compliance achieved
    • Infrastructure set up for the website update launch
    Services:
    Azure Security Audit (White-box)
    Mar 5, 2026
    AWS Security Audit for a Recruiting Platform
    AWS Security Audit for a Recruiting Platform
    • Threat detection time reduced to 20 minutes.
    • Full compliance with GDPR requirements ensured.
    Services:
    AWS cloud environment security assessment (White-Box)
    Mar 3, 2026
    Security Policy Audit for a Fintech Company
    Security Policy Audit for a Fintech Company
    • Seven key cybersecurity policies were reviewed and assessed
    • Regulations aligned with ISO 27001, DORA, GDPR, and NBG
    Services:
    Security policy and compliance audit
    Nov 20, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice Oleksandr Filipov
    Oleksandr Filipov
    Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice

    In this article, we outline the main types of vulnerabilities. Based on the results of our projects, we have also compiled top lists of the most common and the most critical ones.

    Mar 7, 2026 15 min
    Davos Innovation Week 2026: Crypto and Security Without Compromise Cybersecurity News from Datami
    Cybersecurity News from Datami
    Davos Innovation Week 2026: Crypto and Security Without Compromise

    The Datami team took part in Davos Innovation Week 2026, which took place on January 19–23, and presented its expertise. Datami CGO Oleksii Lavrenchuk delivered a talk on the transformation of cyber risks.

    Mar 4, 2026 15 min
    What is an Advanced Persistent Threat (APT)? Oleksandr Filipov
    Oleksandr Filipov
    What is an Advanced Persistent Threat (APT)?

    Advanced Persistent Threats (APTs) are sophisticated cyberattacks in which an attacker remains unnoticed in the network for an extended period of time. What should you do to avoid becoming a victim of an APT attack?

    Dec 2, 2025 15 min
    Order a consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy