How 7ASecurity Audits Work: Interim Findings, Manual Testing, and Free Fix Verification

A clear, practical walkthrough of the 7ASecurity audit process: threat-model driven scoping, a dedicated communication channel with interim findings, and free fix verification—so issues are fixed, not just reported.

Code audit for the Tor Project by 7ASecurity

For the past three years, the Tor Project has been working to improve the tools, resources, and protocols used to monitor the health of the Tor network. This work aims to strengthen the Tor network's resilience and resist relay attacks. As part of this effort, in July and August 2025, 7ASecurity conducted a code audit of those …

Thunderbird Security Audit by 7ASecurity

7ASecurity is proud to share the results of our security audit of Thunderbird Send. Thunderbird Send is an open source platform for sending and receiving end to end encrypted files, for use with Mozilla Thunderbird or web browsers. With the help of the Open Source Technology Improvement Fund and the Mozilla Foundation, this project will …

Free Pentest Contest 2025: Boost Your Security Today!

It’s back and bigger than ever!The Free Pentest Contest 2025 — giving organizations around the world the opportunity to receive a professional, full-scope penetration test completely free of charge. Our goal remains simple: to make world-class cybersecurity accessible to everyone. Whether you’re a growing startup, a large enterprise, or an independent developer, this contest is …

Conda-Forge Security Audit by 7ASecurity

7ASecurity is proud to share the results of our security audit of conda-forge. conda-forge is a community-driven open source repository of conda package manager recipes. With the help of the Open Source Technology Improvement Fund and the Sovereign Tech Agency, this project has invested in its longevity and security health by hardening its resilience and …

LinkerD Security Audit by 7ASecurity

7ASecurity is proud to share the results of a recent security audit of Linkerd. Linkerd is an open source service mesh for Kubernetes which prioritizes reliability, security, and simplicity. Thanks to the help of the Open Source Technology Improvement Fund (OSTIF) and the Cloud Native Computing Foundation, this project can continue to provide a lightweight …

AmneziaVPN Security Audit by 7ASecurity

Our team of senior security experts recently completed another comprehensive security audit of AmneziaVPN. Over a 16-day period, we rigorously examined their Android, iOS, and Desktop clients, as well as their AmneziaWG and XRay services. Our goal was to identify any potential vulnerabilities and assess the overall security posture of their VPN solution. Key Findings: …

How Regular Pentesting Helps Maintain SOC 2 Compliance

Breaches that could have been prevented with pentesting. Achieving SOC 2 compliance is a big deal. It shows your clients that you take data security seriously. But getting certified is just the first step. Maintaining compliance and securing your systems requires ongoing effort, so SOC 2 pentesting is vital. Think of SOC 2 compliance as …

SecureDrop Security Audit by 7ASecurity

About SecureDrop SecureDrop is an open source whistleblower submission system that media organizations and NGOs can install to accept anonymous, secure documents from sources. It receives documents via the Tor network (a distributed network of relays that help protect users’ privacy), records only the date and time of the transfer, and enables recipients to view submissions in its …

7ASecurity Completes LitmusChaos Audit

7ASecurity is proud to share the results of our security audit of LitmusChaos. LitmusChaos is an open source chaos engineering platform for a multitude of cloud platforms. With the help of the Open Source Technology Improvement Fund (OSTIF) and the Cloud Native Computing Foundation, this project can continue to provide secure chaos testing environments for …