Accepting new clients

We hack casinos
before someone else does.

CC Security Audits is a boutique security firm focused on iGaming platforms. We find what automated scanners miss: exposed admin panels, session hijack chains, and account takeover vectors through deep manual analysis.

Get in Touch See Sample Findings →
40+
Vulnerabilities reported
6
Platforms audited
100%
Responsible disclosure
Our Story
Founded by operators, not consultants.
We built infrastructure before we broke it. That's the difference.
CC Security Audits started with real security work, not theory. In early 2026, while building distributed storage systems at Curio Storage, we kept finding critical vulnerabilities in the platforms around us. Admin panels exposed to the internet. OAuth flows missing PKCE. WebSocket backends leaking internal data without any authentication. CORS policies that let any website read user sessions.

We reported every single one. Responsibly, every time. And we noticed a pattern: the platforms that needed the most help were mid-size iGaming operators. Big enough to handle real money, too small for a dedicated security team. So we became that team.

Today we focus exclusively on iGaming. We know the stacks: Laravel, Rails, Node.js backends, Centrifugo and Socket.io real-time layers, SumSub and Shufti KYC integrations, Curaçao and Costa Rica licensing requirements. We find vulnerabilities that matter, write clear reports, and help teams fix them.
Nicklas Reiersen, Founder
Software Engineer · Copenhagen, Denmark · March 2026
Services
Deep security for iGaming platforms.
Every engagement is manual. We don't run Nessus and call it a day.
🔍

External Penetration Test

Black-box and grey-box testing of your web applications, APIs, and infrastructure from an attacker's perspective.

🎰

iGaming Platform Audit

Casino-specific review covering payment flows, KYC bypasses, game integrity, withdrawal logic, and chat system security.

🔐

Authentication & Session Review

Deep dive into OAuth/OIDC, JWT handling, 2FA flows, session management, and account takeover chains.

📋

Configuration & CORS Audit

Cross-origin policies, CSP headers, cookie flags, API gateway configs, and CDN rules. We find these in nearly every engagement.

🔄

Ongoing Security Retainer

Monthly surface monitoring, priority testing for new releases, and re-testing after fixes. Security is not a one-time event.

📄

Executive Reporting

Clear reports with CVSS scoring, reproduction steps, and fix guidance. Written for engineers and executives alike.

Sample Findings
What we find in the first 48 hours.
Real vulnerability classes from past engagements. Client details redacted.
Critical

CORS Wildcard + Credentials on Player API

API reflected any Origin header with Access-Control-Allow-Credentials: true. An attacker-controlled page could read authenticated responses including balances, personal data, and session tokens from any logged-in player.

Session Hijack
Critical

Mass Assignment to Account Takeover Chain

Profile update endpoint accepted undocumented fields. By injecting a phone number, an attacker could enable SMS-based 2FA, then use password reset to take over any account and initiate withdrawals.

Account Takeover
High

Unauthenticated WebSocket Access to Chat Backend

Socket.io real-time chat system accepted connections without authentication. Connected clients received all player support messages in real time.

Data Exposure
High

OAuth CSRF: Missing State Parameter + No PKCE

Social login via Google/Telegram had no CSRF protection or PKCE challenge. Attacker could force-link their own identity to a victim's account through login CSRF.

Authentication Bypass
Medium

Exposed Feature Flags with Security Toggles

Client-side JavaScript leaked 700+ feature flags including internal user IDs and security toggles (WAF bypass, VPN detection, geo-restriction) with their current states.

Information Disclosure

All findings were responsibly disclosed and remediated. No client data was exfiltrated during testing.

How We Work
From first contact to fixed.
Clear scope, deep testing, actionable results. No surprises.
01

Scoping Call

We define the engagement: which domains, APIs, and environments are in scope. You set the rules, we work within them.

02

Reconnaissance

Deep surface mapping. Subdomains, tech stack fingerprinting, API endpoint discovery, JavaScript analysis, infrastructure enumeration.

03

Manual Testing

Hands-on exploitation attempts against authentication, authorization, business logic, payment flows, and platform-specific vectors.

04

Reporting & Remediation

Detailed report with CVSS scores, proof-of-concept steps, and fix guidance. We re-test after your team patches.

Pricing
Transparent pricing. No hidden fees.
Every engagement includes a full written report with remediation guidance.

Targeted Review

Focused on 1-2 critical areas

$5,000
  • Single application or API scope
  • Authentication and session review
  • CORS and header audit
  • Written report with CVSS scoring
  • One re-test cycle included

Security Retainer

Continuous protection

$8,000 / month
  • Monthly external surface monitoring
  • Priority testing for new releases
  • Ongoing vulnerability management
  • Direct Telegram/email access to team
  • Quarterly comprehensive re-assessment

Let's talk security.

We respond within 24 hours. Tell us about your platform and we'll send a scoping proposal.