Valtik Studios
Pattern Library

The vulnerability classes we hunt

Composite scenarios drawn from research, public disclosures, and engagement experience. Each pattern shows the vulnerability class, the business impact, and the remediation approach. These are not specific client engagements; they are the recurring failure modes worth hunting on every assessment. Each links to the deep-dive research for that pattern.

For confidentiality reasons, Valtik does not publish identifiable client engagement detail. Verifiable references are available to qualified prospects under NDA.

34+
Platforms researched
23
Vulnerability labs
100+
Blog posts published
500+
CVEs referenced in research
Healthcare SaaSHealthcare SaaS handling 100K+ patient recordsSupabase + Clerk + Next.js

Supabase service_role key in JS bundle

Critical
Impact

Full database read/write without authentication. Any visitor could have dumped the entire patient database.

Remediation

Key rotated within 4 hours. Service-role usage moved to server-only API routes. RLS policies strengthened. Sentry breadcrumbs configured to redact keys.

Fintech / PaymentsPayments + fintech infrastructure on AWSAWS + Rails + Kubernetes

Application SSRF → AWS IMDSv1 credential exposure

Critical
Impact

Chain from unauthenticated web request to EC2 instance role credentials. Role had S3 full access, RDS read, and Secrets Manager read. Complete account compromise available.

Remediation

IMDSv2 enforced via SCP. Application patched. WAF rules added for SSRF patterns. IAM roles scoped down per least-privilege review.

B2B Marketing SaaSB2B SaaS with public GraphQL endpointNext.js + Hasura + PostgreSQL

Hasura introspection + admin secret cracking

Critical
Impact

GraphQL introspection enabled exposed full schema. Admin secret rotated quarterly with a predictable pattern. Cracked in minutes. Full database access via Hasura admin console.

Remediation

Introspection disabled in production. Admin secret rotated to entropy-generated. Rate limiting added. Row-level auth rules reviewed and tightened.

Legal Tech SaaSMulti-tenant SaaS using Clerk for authClerk + Convex + Next.js

Clerk unsafe_metadata privilege escalation

High
Impact

Role assignment stored in unsafe_metadata (client-writable). Any authenticated user could PATCH their own user object to become admin of their organization. Cross-tenant access possible via admin-only Convex functions.

Remediation

Role moved to private_metadata (server-only). Convex functions hardened with explicit role checks. Clerk webhook listeners added to detect metadata tampering attempts.

DTC E-CommerceMid-market e-commerce on Shopify PlusShopify + custom checkout + Sentry

Sentry public org + exposed payment page scripts

High
Impact

Sentry project was public (misconfiguration). Error breadcrumbs included credit card BIN fragments, partial cardholder names, and session tokens from checkout errors. PCI DSS 4.0 Requirement 6.4.3 failure.

Remediation

Sentry project set to private. PII scrubbing rules applied. Payment page script inventory completed per PCI DSS 4.0. Feroot deployed for ongoing payment page monitoring.

Enterprise Observability SaaSSelf-hosted observability platformsSelf-hosted Kubernetes + Elasticsearch + Grafana

Elasticsearch cluster exposed, Grafana admin/admin

Critical
Impact

Development Elasticsearch cluster accessible from internet with no authentication. Indices included production log samples with authentication tokens and internal API keys. Grafana on the same network still had default admin/admin credentials.

Remediation

Cluster moved behind ZTNA. X-Pack authentication enabled. Grafana credentials rotated with SSO enforced. Network segmentation review completed. Ongoing monitoring deployed.

HealthTech (Telehealth)Telehealth + consumer health apps on FirebaseFirebase + React Native + Cloud Functions

Firebase anonymous auth + permissive Firestore rules

Critical
Impact

Anonymous sign-in enabled with Firestore rules allowing `read, write: if true` on most collections. Any visitor could read every patient appointment, chat log, and provider note in the database.

Remediation

Rules rewritten per principle of least privilege with explicit auth + ownership checks. Anonymous auth disabled for production tenants. App Check deployed. Security review cadence established.

Manufacturing (DIB Supplier)DIB suppliers approaching CMMC Level 2On-prem + Azure Government

CUI on standard Microsoft 365 tenant, not GCC High

High (compliance)
Impact

Company thought they were CMMC-ready. CUI was flowing through standard M365 (not GCC High). This fails DFARS 252.204-7012 FedRAMP Moderate requirement. Contract cancellation risk.

Remediation

Migration to GCC High scoped and budgeted. CUI enclave designed to minimize scope. SSP updated. Path to C3PAO assessment cleared with 6-month timeline.

HR Tech SaaSB2B SaaS using Stripe + webhook integrationsSupabase + Next.js + Stripe

Stripe webhook HMAC signature bypass

Critical
Impact

Webhook handler trusted `Stripe-Signature` header with weak validation. Forged webhook could update subscription status, grant lifetime access, modify billing records, and trigger refunds.

Remediation

Full Stripe webhook signature verification per Stripe docs. Idempotency keys enforced. Webhook replay protection via Stripe event ID tracking. Rate limiting on webhook endpoint.

Want to know what we would find in yours?

Every engagement starts with a free website security check. 48-hour turnaround. No obligation. No sales pitch. You get the report, you decide what to do next.

Pattern library entries are composite scenarios drawn from research and public disclosures, not identifiable client engagement detail. Active engagements are covered by mutual NDA. Trust Center