DemoCompany v7.2.0. Deterministic execution logs and verified isolation proofs are contained within this report.
This report is a **Verified Attestation**. Every finding is backed by deterministic execution logs from a mirrored PostgreSQL environment. Attack vectors were physically simulated to verify policy efficacy.
Integrity Stamp
HASH: 7a68658c...MODE_LIVE
Missing auth.uid() checks on workflow execution payloads.
Transitive join path from public.comments to internal.secrets.
Unencrypted Admin password hashes exposed via unauthenticated API endpoint.
Total customer base enumeration (BOLA) leads to high churn risk via competitor targeting.
Secret exposure invalidates SOC2 "Credential Isolation" controls.
Unauthorized data pivot allows cross-tenant exfiltration without audit logs.
BFS traversal from public entry points to sensitive data.
Payload:
Deterministic verification of data boundaries.
| Table / Resource | Status | Verification Evidence |
|---|---|---|
|
Credential Vault Isolation
|
CRITICAL FAIL | Any trial user can pull Enterprise secrets. |
|
OAuth Token Scoping
|
TRANSITIVE LEAK | Pivot via oauth_refresh_tokens table. |
|
API Key Persistence
|
UNPROTECTED | Long-lived keys lack RLS enforcement. |
|
Execution Payload Privacy
|
BOLA RISK | Workflow outputs readable by all tenants. |
|
Staff Directory (Admin)
|
EXPOSED | Admin password hashes accessible via API. |
|
Client/Org Mapping
|
FAIL | Customer base enumeration possible. |