NewAI Security Practice — securing the AI systems your business now depends on.

WASA · External/Internal

Web Application Security Assessment

OWASP-aligned, manual security testing of the web apps and APIs your business runs on — covering the full OWASP Top 10, OWASP API Top 10, and the business-logic flaws no scanner will ever find.

Why WASA

Web applications and APIs are where customer data lives, where money moves, and where the attack surface grows fastest. They're also where most automated tooling falls short — DAST scanners catch a fraction of OWASP Top 10 issues and almost none of the business-logic flaws that cause real breaches. WASA is built around what humans do better than tools: understand intent, chain weaknesses, and abuse trust.

Every WASA includes authenticated testing across every meaningful role and tenant. We work from the same threat models your engineers use, then go after them in ways your engineers haven't thought of yet.

OWASP Top 10 — covered, then exceeded

A01

Broken Access Control

IDOR, missing function-level authorization, role-bypass, forced browsing, JWT manipulation.

A02

Cryptographic Failures

Weak TLS, weak hashes, hardcoded keys, unencrypted PII at rest, predictable tokens.

A03

Injection

SQLi, NoSQLi, OS command injection, LDAP injection, ORM injection, server-side template injection.

A04

Insecure Design

Missing rate limits on auth, lack of resource quotas, unsafe defaults, threat-modeling gaps.

A05

Security Misconfiguration

Verbose errors, default credentials, open S3 buckets, missing security headers, debug endpoints exposed.

A06

Vulnerable & Outdated Components

Dependency CVEs, unpatched frameworks, abandoned libraries — validated, not just listed.

A07

Identification & Authentication Failures

Credential stuffing, weak MFA, broken session handling, predictable password reset.

A08

Software & Data Integrity Failures

Unsigned updates, insecure deserialization, supply-chain risks in CI/CD.

A09

Security Logging & Monitoring Failures

Auditable events not logged, log injection, no alerting on suspicious sequences.

A10

Server-Side Request Forgery (SSRF)

Cloud metadata exfil (IMDS), internal service pivots, blind SSRF chains.

APIs — OWASP API Security Top 10

  • API1 Broken Object Level Authorization (BOLA / IDOR on resources)
  • API2 Broken Authentication (JWT weaknesses, key confusion, refresh token abuse)
  • API3 Broken Object Property Level Authorization (mass assignment, excessive data exposure)
  • API4 Unrestricted Resource Consumption
  • API5 Broken Function Level Authorization
  • API6 Unrestricted Access to Sensitive Business Flows
  • API7 Server-Side Request Forgery
  • API8 Security Misconfiguration
  • API9 Improper Inventory Management (shadow APIs, deprecated versions)
  • API10 Unsafe Consumption of APIs (third-party trust boundaries)

Beyond OWASP

Business logic

Workflow bypass, race conditions, price manipulation, multi-step transaction tampering — the things scanners structurally cannot find.

Authorization matrices

Multi-role, multi-tenant testing across every endpoint × role × resource combination.

Source-code-assisted (gray-box)

When access to source is available, we use it to find logic flaws faster and with higher coverage.

Modern frontends

Single-page apps, GraphQL, gRPC, WebSockets — we test the actual transport, not a proxy approximation.

Highlights

  • Authenticated, multi-role, multi-tenant testing
  • OWASP Top 10 (current) and OWASP API Security Top 10 coverage
  • Business-logic and authorization testing — the part automation can't do
  • Source-code-assisted (gray-box) review available
  • GraphQL, gRPC, WebSocket, REST, and SOAP API support
  • Manual validation eliminates false positives
  • Free retesting within six months

Ready to start a conversation?

Talk to a senior consultant — we'll scope an engagement that fits your environment.