Valtik Studios

Security tools

The custom Python auditors we wrote and run on client engagements. Nine tools. Each one addresses a specific 2026 attack pattern or compliance gap that generic scanners miss.

oauth21_tester.py

OAuth 2.1 compliance and attack auditor

OAuth 2.1AuthenticationIdentity

Probes RFC 8414 authorization-server metadata, tests grant types against the OAuth 2.1 deprecation list, validates PKCE enforcement, checks DPoP support, validates JWKS, probes dynamic client registration, tests introspection. Tested live against accounts.google.com and Microsoft Entra. Finds real misconfigurations that generic scanners miss.

Sample output: 2 HIGH findings on accounts.google.com (implicit-style response types permitted).
pci_payment_script_audit.py

PCI DSS 4.0 6.4.3 + 11.6.1 payment-page script integrity auditor

PCI DSS 4.0Web SecurityCompliance

Catalogs every script on a payment page. Validates Subresource Integrity hashes. Validates Content Security Policy for script-src strictness. Detects inline script without nonces. Detects external scripts without SRI. Reports gap against PCI DSS 4.0 6.4.3 (script authorization) and 11.6.1 (payment page change detection).

Typical finding: 20-50 third-party scripts on a payment page, 80%+ without SRI. This is the #1 PCI DSS 4.0 audit failure in 2026.
pci_script_monitor.py

Continuous payment-page script monitoring daemon

PCI DSS 4.0MonitoringSaaS

Productized version of the above. Runs continuously against specified payment pages. Alerts on any unauthorized script change, SRI hash mismatch, or new script addition. Shipping as a $99/month SaaS for PCI 11.6.1 compliance automation.

Live deployment monitors checkouts 24/7 for Magecart-style injection attempts.
email_auth_audit.py

Comprehensive email authentication auditor

Email SecurityDMARCDKIM

Validates SPF, DKIM (with key rotation analysis), DMARC (with policy strength evaluation), MTA-STS, TLS-RPT, BIMI, DNSSEC on the target domain. Cross-references against Gmail and Microsoft 365 enforcement expectations. Specific remediation output per finding.

Live-tested against valtikstudios.com: HIGH finding on resend._domainkey using 1024-bit RSA (rotate to 2048+). MEDIUM on DMARC p=none with no rua reporting.
webhook_forge_test.py

Payment webhook forgery tester

WebhookAPI SecurityPayment Security

Tests webhook endpoints for proper signature verification. Supports Stripe, Shopify, Twilio, SendGrid, and GitHub signature schemes. Attempts forged payloads with invalid signatures, missing signatures, and timing-attack vulnerable verification. Reports specific provider-compatible exploit payloads.

Common finding: 40% of tested webhook handlers skip signature validation entirely.
supply_chain_risk.py

NPM and PyPI typosquat and supply chain risk detector

Supply ChainNPMPyPI

Analyzes package dependencies. Levenshtein distance + adjacent-swap + homoglyph typosquat detection. Cross-references against published threat intelligence. Validates maintainer history, release cadence, and abrupt ownership changes. Detected axios -> axois (adjacent swap), react -> reacl (homoglyph), lodash -> lodash-next (namespace squat).

5/5 detection on pre-verified test data including adjacent-swap variants.
k8s_admission_probe.py

Kubernetes admission controller policy tester

KubernetesCloud NativeAdmission Control

Runs 14 admission tests against target cluster via kubectl apply --dry-run=server. Tests privileged container, hostPath: /, docker.sock mount, hostNetwork, hostPID, hostIPC, SYS_ADMIN capability, :latest tag enforcement, resource limits, automount ServiceAccount tokens. Safe to run on production clusters because --dry-run=server does not actually create resources.

Typical production cluster: 6-10 admission tests pass (should fail). Reveals missing Pod Security Standards or Gatekeeper / Kyverno policies.
sfec_audit.py

Salesforce Experience Cloud guest user auditor

SalesforceSaaS SecurityAuthorization

Probes the 2022 Varonis-disclosed class of Salesforce Experience Cloud misconfigurations where guest users can access more data than intended. Tests public APIs, object permissions, profile configuration. Outputs specific remediation guidance tied to the Salesforce security controls.

Every Experience Cloud audit we have run in 18 months produces at least one finding. Misconfiguration persists industry-wide.
valtik_full_audit.py

Full-audit orchestrator

OrchestrationReportingEngagement

Runs oauth21, email, pci-audit, and sfec (when applicable) in sequence against a target domain. Produces unified Markdown and JSON reports with findings grouped by severity. Used as the opening artifact on compliance readiness engagements.

Produces a report in 10-15 minutes that takes human auditors 1-2 days to produce manually.

We run these on every engagement

Not as a replacement for human-led testing. As the automation layer that finds the known issues fast, so human time goes into business logic, chained exploitation, and the findings that scanners cannot produce.