Skip to main content
Pay per finding

If we don't find anything, you don't pay

A pentest with zero financial risk for you. We audit your systems with the same rigor as a traditional engagement — but you only pay for confirmed vulnerabilities, based on their severity.

How does it work?

Pay per finding is a penetration testing model where you only pay for the vulnerabilities we actually find and confirm. There's no upfront fee, no fixed cost — just a transparent pricing table based on the severity of each finding.

We define the scope together, sign an agreement with the severity-based pricing table, and then we go to work. If we find nothing, you pay nothing. If we find issues, you pay per finding according to the agreed rates. Every finding comes with the same quality deliverables as a traditional pentest: detailed reproduction steps, evidence, and remediation guidance.

Why pay per finding?

01

Zero risk for you

No upfront investment. If your systems are secure, you pay nothing and gain the confidence of knowing they've been tested by professionals.

02

Aligned incentives

We only get paid when we deliver real value. Our motivation is to find every vulnerability that matters, not to pad a report.

03

Perfect first engagement

If you've never had a pentest and aren't sure what to expect, this model lets you experience professional security testing with zero financial commitment.

04

Transparent and predictable

You know exactly what each finding costs before we start. No surprises, no hidden fees — just a clear price-per-severity table.

Pricing by severity

Each confirmed vulnerability is priced according to its severity, assessed using the industry-standard CVSS v3.1 framework. Exact rates are agreed before the engagement starts.

Critical CVSS 9.0 – 10.0

Remote code execution, authentication bypass, full data breach vectors.

High CVSS 7.0 – 8.9

Privilege escalation, significant data exposure, impactful injection flaws.

Medium CVSS 4.0 – 6.9

Cross-site scripting, information disclosure, misconfigurations with limited impact.

Low CVSS 0.1 – 3.9

Minor information leaks, best-practice deviations, low-impact issues.

We agree on a maximum cap before starting, so you always know your worst-case cost.

Scope and rules

  • We define the target systems and boundaries together before starting — same as a traditional pentest.
  • A formal scope agreement and pricing table are signed before any testing begins.
  • Testing follows OWASP, PTES, and NIST methodologies — no shortcuts.
  • Duplicate or informational findings are not charged. Only confirmed, unique vulnerabilities count.
  • You receive the same deliverables as a traditional pentest: executive summary, technical report, and remediation support.

Common questions

What if you find a lot of vulnerabilities?

The maximum cap we agree on before starting protects you. Even if we find many issues, your total cost won't exceed the cap. Think of it as a traditional pentest price that you only reach if there are significant findings.

Is the methodology different from a regular pentest?

No. We apply the exact same methodology, tools, and rigor. The only difference is the pricing model — the quality of testing is identical.

What types of systems can be tested?

Web applications, APIs, infrastructure, and cloud environments. We agree on the specific scope during the initial conversation.

Who decides the severity of a finding?

Severity is assessed using CVSS v3.1, an industry-standard framework. We provide full evidence and reproduction steps so you can verify every assessment. If there's a disagreement, we discuss it transparently.

Ready to test your systems with zero risk?

Let's define a scope and pricing table. If we don't find anything, you don't pay.