koscak.ai · security services

The dam always has cracks.

White-hat pentesting, AI model red-teaming, and infrastructure audits for teams building on the edge of what's possible. We find every crack before the water does.

23 min
Median cold-start to first finding
0
Production systems touched
100%
Findings with CVSS + remediation
SK · EN
Reports in both languages
Services

Four lenses. One report.

Most security vendors sell you one. We bring every lens to every engagement because modern attackers don't respect your org chart.

Web & API pentesting

External perimeter, authenticated app surface, business-logic bugs. Real findings, real CVSS, with remediation your dev team can apply today.

  • OWASP Top 10 2021 coverage
  • Chain-aware: IDOR → SSRF → RCE paths
  • CVSS 3.1 + CWE mapping per finding
  • Non-destructive, forensic-grade evidence

AI model red-team

Prompt injection, jailbreaks, RAG poisoning, model exfil, supply-chain risk. The attack surface everyone is deploying and nobody is testing.

  • Direct + indirect prompt injection
  • Tool-use / function-calling abuse
  • Embedding poisoning & RAG integrity
  • Model-theft & extraction probes

Infrastructure audit

Cloud config, network topology, identity posture, secrets hygiene. The boring work that quietly closes the majority of real incidents.

  • Cloud IAM & least-privilege review
  • Network segmentation audit
  • Secrets-in-source scan
  • Build-pipeline supply-chain check

Compliance-grade reports

NIS2, GDPR Art. 32, SOC 2 evidence, insurance-carrier friendly. Deliverables that pass auditor scrutiny and read well for executives.

  • NIS2 essential-entity mapping
  • SK CERT notification analysis
  • Executive-ready bilingual reports
  • Re-test addendum included
How it works

Paste a URL. See your cracks.

Drop a link. Our automated scanner runs a first-pass sweep — headers, cookies, exposed endpoints, stack fingerprint, obvious misconfigurations. You get a Lighthouse-style report in under 90 seconds. Public version is free. The paid version digs where attackers actually live.

koscak · scan · example.com
~ koscak/scan example.com
# discovering surface…
DNS + WHOIS + CT-logs resolved
7 subdomains found · 2 externally reachable
Tech stack: Apache · Node/Express · PostgreSQL
# probing non-destructively…
Missing HSTS on login endpoint
3 cookies without HttpOnly/Secure flags
CRITICAL unauth admin interface at /admin/api
CRITICAL spoofable sender on mail relay
# remediation paths queued for review
~ report ready · 23.4s elapsed
The threat landscape changed

Your attack surface grew overnight.

Every LLM you deploy, every agent you ship, every RAG you wire up is a new class of risk. The people writing exploits are already automating against yours. Here's what you can't afford to ignore in 2026.

Prompt injection

Attacker-crafted text hidden in documents, emails, or tool outputs hijacks your AI into running their instructions. Direct and indirect vectors now routine.

RAG poisoning

Seeding your knowledge base with adversarial content that changes what your assistant answers. Invisible in search logs, detectable only by test-harness.

Supply-chain compromise

Malicious packages, poisoned model weights, typosquatted dependencies. One bad import and your product ships an attacker's backdoor.

Model extraction

Systematic querying that reconstructs your fine-tuned model's behaviour for the cost of an API budget. Your moat, leaked one prompt at a time.

Tool-use abuse

Your AI agent has filesystem, shell, and network access. One crafted instruction and it runs an attacker's commands with your service-account privileges.

Perimeter erosion

Dev environments exposed to the public internet. Webhooks from third-party services. OAuth scopes that grew past what anyone remembers granting. Classic holes, modern scale.

The team

Built by people who ship.

We're a small Slovak-based team. We've reversed our own hardware, found 0-days in enterprise kit, trained our own models, and written the tooling we use on every engagement. We don't outsource to contractors.

Dr. Juraj Koščák

Lead scientist · PhD

10+ papers on stochastic sparse learning across the 1980s–90s. 30 years of industrial security + AI posture across enterprise Slovak deployments.

Filip Phauler

Builder · research architect

Rust-native security tooling. Multi-pod GPU-mesh architecture for red-team automation. Reverse-engineered his own ASUS laptop to find a vendor 0-day nobody had in years.

Laura Ilčin

Brand · delivery

Human-side of a technical engagement. Scope, rules, deliverables, and the post-remediation relationship. The reason our clients call us back.

Recent engagement

"100% external access. Zero credentials used."

A Slovak industrial client asked us to verify their external perimeter. Their in-house security team said attackers couldn't get in from outside. 23 minutes of non-destructive probing later, we'd documented 12 findings including two CRITICAL unauthenticated paths into production mail + SMS infrastructure.

12
Findings
2
Critical / CVSS 9+
0
Writes to their systems
FAQ

What people ask first.

Is the free scan actually free?

Yes. No credit card, no trial limit. You get a public-surface report with verified findings we're willing to show publicly. The paid engagement is where we dig into authenticated surface, internal logic, and AI model behaviour.

Will this trigger my WAF or alert my security team?

The free scan is non-destructive, read-only HTTP probes from a single origin. It looks like an ordinary scan that your WAF sees dozens of times per day. If you want us to coordinate with your SOC for a full engagement, we do that by default.

How is this different from Qualys, Nessus, or a Burp scan?

Automated scanners produce CVE lists. We produce remediation roadmaps — CVSS-scored findings chained into realistic attack paths, with exact verification commands your engineers run to confirm the fix. Plus AI-era surface that automated scanners don't even look for.

Do you sign NDAs?

Mutual NDA before every engagement. All evidence files live on our isolated Slovak infrastructure, retained 90 days post-signoff unless you ask for earlier destruction or longer retention. Never cloud-stored, never shared with third parties.

Who actually reads the report?

Reports are bilingual (SK + EN) with layered depth: a one-page executive summary for leadership, detailed findings with CVSS/CWE/OWASP for your security lead, and copy-pasteable remediation commands for the engineers who'll actually fix things.

What's the engagement timeline?

Free scan: 90 seconds. Scoping call: a week. Engagement itself: typically 1-2 weeks of active testing. Report delivery: 3 business days after testing concludes. Post-remediation re-test: included at no charge on Phase 1 engagements.

Free scan

See your cracks in 90 seconds.

Drop your URL. We run a non-destructive first-pass sweep, return a Lighthouse-style report with what we found on the surface. The public findings are free. The deep work is a conversation.

Non-destructive only. Read-only probes, no writes, no auth attempts. You'll get a shareable report link + a short email summary. No credit card, no upsell.

Ready to see your cracks?

90-second free scan, or a conversation about a proper engagement. We reply within one business day.