en

API Security Testing for GDPR Readiness

Client:
BookingSync — a French platform for short-term rental property management
Industry:
Software Development
Focus:
Protecting personal data of users interacting via web portal and API
Main challenge:
Assessing the security of API endpoints to prevent data leaks and unauthorized access
Market:
International (primarily Europe)
Services provided:
Gray-box API penetration testing
Key Takeaways
  • Assessed API data flows to ensure GDPR compliance
  • Delivered actionable fixes to improve PII protection
  • Identified several low-level vulnerabilities
  • Delivered a report with security enhancement recommendations
  • 100%
    compliance with API security best practices
    3+
    low-level vulnerabilities identified and mitigated
    3
    weeks total duration of the testing process
    API Security Testing for GDPR Readiness
    Is API expansion always safe for a platform? The international company BookingSync decided not to take any chances and initiated an audit of its API endpoints. The Datami team performed a gray-box pentest and uncovered low-level vulnerabilities. The resulting recommendations helped BookingSync boost its API protection and reduce the risk of data leaks.

    BookingSync is a French technology company that provides a platform for managing short-term rental properties. Serving an international market—primarily across Europe—BookingSync enables thousands of hosts and guests to access its services daily through a user-friendly web portal and API integrations.

    While the company does not operate in a regulated industry, it handles large volumes of user personal data, making robust system security a top priority.

    Objectives and challenges

    BookingSync's primary concerns were unauthorized access to its API and potential data leaks. To proactively mitigate reputational risks, the company initiated a scheduled security assessment.

    Project objective was to identify potential vulnerabilities in API endpoints and assess their resilience against external threats.

     
    • 1. Conduct a gray-box pentest of the current API endpoints.
    • 2. Detect vulnerabilities that could lead to data compromise and evaluate the overall security posture.
    • 3. Deliver a comprehensive report with actionable recommendations for improving API documentation and planning future security testing.
    icon
    Penetration testing
    Gray-box pentest of API endpoints
    icon
    Vulnerability identification
    Discovery and prioritization of security risks
    icon
    Reporting & recommendations
    Detailed report with practical advice for improving security
    Our approach

    To assess the security of BookingSync’s API endpoints, Datami employed a gray-box penetration testing approach. The team had partial access to technical documentation, enabling a deeper analysis of endpoint logic and common access scenarios.

    We combined automated scans using Burp Suite API Scan with manual testing methods to ensure thorough coverage of both standard and unconventional attack vectors.

     

     

    Gray-box
    Gray-box
    The assessment was performed with limited internal knowledge, simulating the actions of a potential attacker with basic access and insight. This approach provided a realistic view of actual risk exposure.
     
    Key stages and solutions

    The Datami team conducted a focused security assessment of BookingSync’s API, targeting vulnerabilities that could potentially lead to personal data exposure. A hybrid approach was used, combining automated scanning via Burp Suite API Scan with manual analysis.

    The process included the following key stages:

     

     

    • Preparation
      Review of technical documentation, test planning, and selection of relevant API endpoints.
    • Testing
      Gray-box pentest using both automated and manual methods, with a focus on authentication mechanisms and resistance to unauthorized access.
    • Analysis & Reporting
      Compilation of a detailed report outlining identified low-level vulnerabilities, along with practical recommendations to improve API security and documentation quality.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    At the start of the project, BookingSync faced an undefined risk level: the platform had been continuously expanding its API endpoints without a full security audit, posing potential threats to the integrity of users’ personal data.

    During the gray-box penetration testing, the Datami team identified several low-level vulnerabilities. While not critical, these weaknesses could potentially be exploited to gain unauthorized access.

    Datami provided BookingSync with the following recommendations:

    1. Regularly assess new API endpoints for compliance with security standards.
    2. Improve the structure and clarity of API documentation.
    3. Implement an internal process for continuous API testing prior to releases.

    Following the implementation of the recommendations, the platform’s security posture improved, and the risk of API-related compromise was significantly reduced. The company avoided a potential data breach that could have led to reputational damage.

    The project was completed in just 3 weeks — nearly twice as fast as the typical market timeframe of 4–6 weeks. No critical incidents were detected, and all identified vulnerabilities were promptly addressed.

    Our certificates
    Key project takeaways

    Thanks to Datami's testing, BookingSync gained a current and detailed view of its API security status, mitigated low-level risks, and developed a clear action plan for future improvements.

    The project helped strengthen the protection of users’ personal data and prevent potential breaches.

    This case study confirms that even advanced tech companies with mature digital products require regular penetration testing to maintain a strong security posture.

     

    Category
    Before the project
    After implementation
    Security status
    Undefined risk due to ongoing API expansion
    Improved; several low-level vulnerabilities identified and resolved
    Critical vulnerabilities
    None observed, but potential unauthorized access threats existed
    No critical vulnerabilities detected
    Account compromise risk
    Theoretically possible via API logic
    Risks reduced through improved authentication
    Security compliance
    Partial adherence to best practices
    Achieved compliance with API security best practices
    Timeline
    Typical duration: 4–6 weeks
    Completed in 3 weeks
    More success stories with Datami
    Browse other project case studies
    DDoS Protection and 24/7 Cyber Monitoring

    DDoS Protection and 24/7 Cyber Monitoring

    • Implemented the DataGuard solution based on Cloudflare to protect the website
    • Established reliable protection against DDoS attacks and bot traffic
    Services:
    Implementation of DataGuard and Cloudflare, 24/7 monitoring
    Aug 8, 2025
    Website Protection from DDoS Attacks

    Website Protection from DDoS Attacks

    • Implemented the DataGuard solution for website protection
    • DDoS protection deployed within 3 days
    Services:
    Website protection with DataGuard (Cloudflare), continuous monitoring, Cloudflare infrastructure management
    Aug 8, 2025
    Protection of E-commerce Websites From DDoS via DataGuard

    Protection of E-commerce Websites From DDoS via DataGuard

    • Implemented DataGuard to protect from DDoS attacks
    • Enabled rapid incident response
    Services:
    24/7 cybersecurity monitoring, integration with Cloudflare
     
    Aug 7, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Pentesting Tools: Who and How Created Metasploit Datami Newsroom
    Datami Newsroom

    Pentesting Tools: Who and How Created Metasploit

    Metasploit is known for everyone interested in cybersecurity. It is not just a framework but a key driver of ethical hacking and pentesting, becoming the standard for thousands of professionals.

    Aug 26, 2025 3 min
    Fraudulent Applications in the Firefox Browser Datami Newsroom
    Datami Newsroom

    Fraudulent Applications in the Firefox Browser

    More than 40 fraudulent programs have been identified in the Mozilla Firefox browser. These extensions mimic legitimate wallet tools from popular platforms. The large-scale campaign has been ongoing since April 2025.

    Aug 22, 2025 3 min
    Large-Scale Fraudulent Operations on Android Datami Newsroom
    Datami Newsroom

    Large-Scale Fraudulent Operations on Android

    According to recent data, applications were discovered that loaded out-of-context ads onto users’ screens. The applications have already been removed by Google from the Play Store. The peak activity exceeded 1.2 billion requests per day.

    Aug 22, 2025 3 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy