Case Studies

Execution failures and fixes from real reviews

Published examples derived from CodeRisk reviews. Each entry distills where a workflow, state transition, or integration path broke down, why it mattered, and how it was resolved.

SecurityError HandlingBoundary Failures

Sanitized on Paper, Leaking in Errors

The system passed visible secret checks, but error-handling paths still returned raw upstream responses, creating a hidden data exposure risk.

Read case study →
Trust BoundaryAccess ControlSecurity

Anonymous Endpoint Triggering Privileged Storage Writes

A support endpoint allowed anonymous submissions as intended, but still performed file uploads using privileged backend credentials, expanding system access beyond its visible trust boundary.

Read case study →
Data ExposurePIILogging

PII exposure through application logs

Sensitive user data was exposed across multiple services due to inconsistent logging behavior. The issue was invisible in testing, but exposed data in production.

Read case study →
System IntegrityAuthRegression

Auth regression across workflow handoff

A multi-step workflow passed authentication checks in isolation, but failed when executed end-to-end. The system appeared reliable, but failed under real usage.

Read case study →