Skip to main content
Security & Compliance

I don’t trust compliance labels. I look at the code.

Most security checks verify that a firewall plugin is installed. I check if your chatbot vendor delivers API keys in frontend code.

Why This Matters

Security gaps aren't a "probably won't happen" problem.

This is not an automated scan. It’s a manual code review. I check client-side code, token handling, CORS configuration, session replay risks, dependency vulnerabilities – and whether what’s on the compliance page matches what’s in the code.

Most security issues aren’t spectacular. They’re mundane. And that’s exactly why they get overlooked – until someone exploits them.

Common

Most security issues come from small, overlooked configuration mistakes.

Costly

The impact of incidents is usually far more expensive than proactive auditing.

Critical

When sensitive data is involved, trust drops fast if security fails.

What I Check

Comprehensive, clear, actionable.

Client-Side Code Review

API keys in the frontend? Tokens in local storage? Encryption keys in source code? I look at what the browser sees.

Third-Party Analysis

Marketing vs. reality: when a vendor writes “HIPAA-compliant,” I check if the code backs it up. Dependencies, licenses, known CVEs.

GDPR & Privacy

Not just whether a cookie banner exists – but whether it works. Pre-consent tracking, data sharing with third parties, missing BAAs.

Accessibility (WCAG 2.1 AA)

Screen readers, keyboard navigation, contrast, forms. Systematic review, not just an automated scan.

Performance Audit

Core Web Vitals, load times, image optimization. What’s slowing your site down and costing you clients?

Access & Configuration

CORS policies, session handling, permissions, server headers. The details automated scanners miss.

Real-World Proof

CVSS 10.0 – the highest risk score possible.

During a security audit for a healthcare platform, I discovered a critical vulnerability chain: unauthorized access to patient data, session hijacking, and privilege escalation. CVSS score: 10.0 out of 10.0.

This meant anyone with internet access could have accessed sensitive patient records. The vulnerability was immediately reported through responsible disclosure and patched by the development team.

This is what happens when security is treated as "optional." My job is making sure it doesn't get to that point for you.

HIPAA Context CVSS 10.0 Responsible Disclosure Vulnerability Chain Analysis

The full case study with timeline, findings, and responsible disclosure process:

Read the full write-up →

Investment

from $900

  • Comprehensive security analysis
  • GDPR & HIPAA compliance check
  • Accessibility audit (WCAG 2.1 AA)
  • Performance audit
  • Clear report with prioritized findings
  • Follow-up video call to discuss results
Request an Audit

Exact price after discovery call, depending on site scope.

Common Questions

About Security Audits

How does an audit work?

I get access to your site (or test externally, depending on scope). Then I systematically test every area: security, compliance, accessibility, performance. You receive a clear report with concrete actions, sorted by priority.

Do I need to give you admin access?

Depends on the scope. For an external security check, I don’t need access. For a full audit (including plugin analysis, permissions), I do. Everything is discussed and agreed upon beforehand.

Can you fix the issues too?

Yes. I can implement the fixes directly, or your existing team uses my report as a roadmap. Both work.

Is this only for WordPress?

No. I audit WordPress, custom code, Shopify, and other platforms. The methodology adapts to the technology.

Who is this for?

Anyone who needs to know if their site is secure. Especially relevant for healthcare organizations, therapy practices, and anyone handling sensitive data.

Request a security audit.

15 minutes, free. I'll review your site and tell you what should be checked.

Or send me a message.

Submissions are handled by form.taxi, a GDPR-compliant service.