saysri.ai: 8 Critical Vulnerabilities Fixed in 7 Days
An AI recruitment startup on Azure, exposed storage, no WAF, and orphaned resources bleeding money. Here's what we did.
| Client | saysri.ai |
| Industry | AI-powered Recruitment |
| Platform | Microsoft Azure |
| Engagement | Infrastructure Audit + Cost Optimization |
| Duration | 7 working days |
| Primary Outcome | 8 critical vulnerabilities fixed |
| Secondary Outcome | 70% ghost costs eliminated |
The Challenge
AI recruitment startup on Azure with TLS 1.0 enabled, public blob storage, no WAF, and orphaned resources bleeding money quietly.
What We Did
Full infrastructure audit covering security vulnerabilities and cost waste. Implemented Cloudflare WAF + DDoS protection, enforced HTTPS and TLS 1.2+, locked down blob storage, and cleaned up all orphaned resources.
What We Don't Do
We focus on finding what's already broken, not theoretical risks. This engagement didn't include:
- ✕ Penetration testing
- ✕ SOC 2 certification
- ✕ Compliance documentation
- ✕ Ongoing monitoring
Just infrastructure clarity: what's exposed, what's wasted, what needs fixing.
Results
"MatrixGard have recommended robust security practices which made our app resilient and helped us to cut unnecessary cloud infrastructure costs which we reinvested on our product development."
Sayeenath
saysri.ai
Share-worthy version
8 critical vulnerabilities. 70% ghost costs. 7 days. Just wrapped up an infrastructure audit for saysri.ai, an AI recruitment startup on Azure. Found: TLS 1.0 enabled, public blob storage, no WAF, orphaned resources bleeding money. Fixed: Cloudflare WAF, HTTPS enforcement, TLS 1.2+, full resource cleanup. That's what a MatrixGard audit looks like.
Want your cloud to look like saysri.ai's?
20 minutes. I'll show you exactly what's costing you money and where you're one misconfig away from a breach. No pitch.