Built internally. Verified independently.

Code reviews and penetration tests for organisations that have chosen Make over Buy.

The market is shifting. So is the risk.

AI has lowered the barrier to internal software development. Teams that previously depended on standard software now build their own solutions. That is a structural advantage: tailored processes, no vendor lock-in, full data control.

But internal development brings internal responsibility. Security gaps that would be filtered through dozens of review cycles at an established software vendor land directly in production when the code is written in-house.

Helm & Nagel
Make vs. Buy

What organisations frequently skip when building internally

  • Systematic code reviews before deployment
  • Penetration testing of the production environment
  • Independent assessment by external security expertise
  • Structured remediation of identified vulnerabilities

Vibe coding is productive. And a security risk.

AI-assisted development accelerates delivery. Code that used to take days is written in hours. It goes into production because it works.

Security is not a functional feature. It does not emerge automatically because the code runs. Researchers and investigative media have documented the pattern: logic errors, unprotected endpoints, missing input validation. Not because developers are careless, but because speed and thoroughness are competing objectives.

Organisations that build internally need an independent review function. Not as a brake on development, but as a precondition for safe operation.

What we assess

Code review

Systematic analysis of source code for security vulnerabilities, logic errors, and architectural weaknesses. Suitable for internal tools, automation solutions, and AI pipelines before go-live or as ongoing quality assurance.

Penetration test

A structured attack on the production environment by experienced security specialists. We test what a real attacker would test: authentication, authorisation, data access, API endpoints, and infrastructure components.

How it works

1

Preparation call

We understand your environment: which solution is being assessed, which systems are in scope, which risk areas you are already aware of. Not a standard questionnaire, but a conversation with the team doing the work.

2

Code review or penetration test

Depending on the situation, we assess the code, the live environment, or both. Depth over breadth: we focus on the areas with the highest potential for damage.

3

Report

A clear findings report with severity classification by CVSS, affected components, and specific remediation guidance. Not a slide deck, but a document your development team can act on directly.

4

Fix

We support the remediation. Either through your internal team with our guidance, or through direct implementation by our specialists.

5

Long-term support

For organisations that build and deploy continuously: regular reviews, a point of contact for emerging security questions, and ongoing oversight of your internal solution throughout its operational life.

Helm & Nagel
Independent review

Your internal developers are not negligent. But an independent reviewer sees what becomes invisible from within the same context.

Who this is for

Teams building with AI assistance

Vibe coding and AI assistants increase development velocity. Without systematic review, they also increase the attack surface.

Organisations in regulated industries

Insurance, banking, energy, logistics: internally built solutions are part of critical processes. Security vulnerabilities here carry operational and regulatory consequences.

IT teams after go-live

Many internal solutions are deployed and never assessed again. A retrospective analysis shows what has changed since the system went into production.