
Case Studies
Explore our case studies to see a selection of projects spanning diverse fields — from cybersecurity and blockchain to fintech, healthcare, marketplaces, CRMs, and hosting systems. Each case highlights the solutions delivered, the challenges overcome, and the impact created across different industries.
Dependency Chaos: Fixing a Critical Production Outage in Record Time
A sudden backend crash brought down the core services of a cybersecurity platform. The failure was traced to a hidden incompatibility between the CloudSploit and AWS SDKs — a breaking change buried in a transitive dependency. The issue was diagnosed and resolved within hours, restoring stability across all systems.
NTP Server Time Drift in South Korea: A Near-Impossible Root Cause
A South Korean enterprise client of a cybersecurity platform faced total login failure due to an undetected 60-second clock drift inside its Kubernetes cluster. The desync broke every TOTP login across the system. The anomaly was traced to NTP misalignment, fixed, and hardened with continuous drift monitoring.
Architecting Clarity: Unifying Frontend, Backend, and AI Workflows
An AI-driven product launch was stalled by confusion across frontend, backend, and AI teams. A unified architecture was designed to clearly define the request–response flow between multiple systems — databases, caches, and vector stores — bringing alignment, security, and development momentum to the project.
Re-Architecting a Multi-Tenant Cloud Vulnerability Scanning Platform for Scale, Isolation, and Observability
The legacy cloud vulnerability scanning service was inefficient, lacked observability, and struggled to scale across multi-tenant environments. A new push-based architecture using Kubernetes priority workloads was introduced, delivering isolation, resource fairness, and full support for SaaS, on-premise, and federated scanning. The redesigned system improved efficiency, reliability, and operational insight while handling extreme variations in account size. The solution set a new standard for multi-environment cloud security scanning.
Bridging Legacy and Modern Auth: Designing a Hybrid OIDC and Custom Authorization System for a Multi-Tenant Enterprise Platform
Falistro modernized a client’s custom JWT-based authorization system by integrating OIDC and multi-provider authentication into a legacy AuthN/AuthZ stack. The project enabled seamless sign-in via OIDC, legacy login compatibility, and automated OEM tenant provisioning — all delivered in weeks, not months.
Exposed Secrets in Docker Layers: Securing a Blockchain Infrastructure Pipeline
During the development of a blockchain indexing backend, Falistro discovered a critical vulnerability — private credentials embedded in a public Docker image. The issue was resolved through key rotation, pipeline refactoring, and secure secret management during build. The remediation evolved into a broader DevSecOps upgrade, hardening the provider’s entire blockchain infrastructure pipeline.






