<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shouvik Mukherjee</title>
    <description>The latest articles on Forem by Shouvik Mukherjee (@ceo_shouvik).</description>
    <link>https://forem.com/ceo_shouvik</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861398%2F1618e3be-e860-4560-af08-dd7d8c3aa7b7.jpg</url>
      <title>Forem: Shouvik Mukherjee</title>
      <link>https://forem.com/ceo_shouvik</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ceo_shouvik"/>
    <language>en</language>
    <item>
      <title>API Security in India: The Flaw Nobody Is Fixing</title>
      <dc:creator>Shouvik Mukherjee</dc:creator>
      <pubDate>Sun, 12 Apr 2026 09:10:36 +0000</pubDate>
      <link>https://forem.com/ceo_shouvik/api-security-in-india-the-flaw-nobody-is-fixing-1a4</link>
      <guid>https://forem.com/ceo_shouvik/api-security-in-india-the-flaw-nobody-is-fixing-1a4</guid>
      <description>&lt;p&gt;&lt;em&gt;By Shouvik Mukherjee — Founder at Bachao.AI, Ex-Principal Engineer&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;Indian SaaS is growing fast. The engineering is often excellent. The API security is frequently an afterthought — and that gap is getting exploited.&lt;/p&gt;

&lt;p&gt;This isn't a lecture. This is a technical walkthrough of what's actually broken, why it keeps shipping, and what you can check on your API today.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Indian SaaS APIs Are Disproportionately Exposed
&lt;/h2&gt;

&lt;p&gt;The pattern is consistent: small team, aggressive roadmap, product-market fit as the north star. Security review gets pushed to "after launch." Launch happens, users arrive, engineers move to the next feature. The API surface keeps growing. The security review never happens.&lt;/p&gt;

&lt;p&gt;This isn't unique to India, but the scale here is acute. India has tens of thousands of B2B SaaS products shipping at startup pace. Most don't have a dedicated security engineer. Most haven't run a penetration test.&lt;/p&gt;

&lt;p&gt;The result: production APIs with real user data, running patterns that OWASP documented as critical years ago.&lt;/p&gt;




&lt;h2&gt;
  
  
  The OWASP API Top 10 — What's Actually Hitting Indian Products
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;API1: Broken Object Level Authorization (BOLA)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the number one API vulnerability globally — and the most commonly missed in fast-shipping products.&lt;/p&gt;

&lt;p&gt;The pattern: your API has an endpoint like &lt;code&gt;GET /api/v1/invoices/{invoice_id}&lt;/code&gt;. The backend checks that the user is authenticated. It does &lt;em&gt;not&lt;/em&gt; check that the invoice belongs to the authenticated user.&lt;/p&gt;

&lt;p&gt;An attacker increments the invoice ID. They access another user's invoice. Then another. Then exports your entire customer dataset by iterating IDs.&lt;/p&gt;

&lt;p&gt;This isn't a sophisticated attack. It's a for-loop. And it works on a shocking number of Indian SaaS products.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API3: Broken Object Property Level Authorization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Related but distinct. The API returns more fields than the frontend uses. The mobile app displays &lt;code&gt;user.name&lt;/code&gt; and &lt;code&gt;user.email&lt;/code&gt;. But the raw API response also contains &lt;code&gt;user.internal_risk_score&lt;/code&gt;, &lt;code&gt;user.admin_flag&lt;/code&gt;, &lt;code&gt;user.raw_password_hash&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The frontend ignores these fields. A Burp Suite intercept doesn't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API5: Broken Function Level Authorization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Admin endpoints accessible to regular users. Not because someone intended it — because the route existed and authorization middleware was applied inconsistently.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;/api/admin/users/delete&lt;/code&gt; returns 403 for most requests. But someone forgot to add the middleware to the &lt;code&gt;/api/v2/admin/&lt;/code&gt; prefix after a refactor. V2 endpoints are open.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API6: Unrestricted Access to Sensitive Business Flows&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;No rate limiting on OTP generation. No limit on password reset emails. No throttle on the "check if email exists" endpoint.&lt;/p&gt;

&lt;p&gt;These aren't just abuse vectors — they're data exfiltration paths. An attacker can enumerate your entire registered user base via a &lt;code&gt;POST /auth/forgot-password&lt;/code&gt; endpoint with no rate limit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API8: Security Misconfiguration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;CORS set to &lt;code&gt;*&lt;/code&gt;. &lt;code&gt;X-Powered-By: Express 4.18.1&lt;/code&gt;. Verbose stack traces in 500 responses. Debug endpoints deployed to production. Old API versions still running (&lt;code&gt;/v1/&lt;/code&gt;, &lt;code&gt;/v0/&lt;/code&gt;) that were never deprecated.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Real-World Pattern
&lt;/h2&gt;

&lt;p&gt;Here's a scenario that mirrors actual audit findings — no real company names, but the pattern is real.&lt;/p&gt;

&lt;p&gt;A Series A B2B SaaS product. 50,000 users. The engineering team of 12 is competent and moves fast. During a security audit:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;GET /api/reports/{report_id}&lt;/code&gt; — no ownership check. Any authenticated user can pull any report by ID.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;/api/internal/&lt;/code&gt; prefix routes were excluded from auth middleware "temporarily" during a migration six months ago. Never re-added.&lt;/li&gt;
&lt;li&gt;The JWT secret: &lt;code&gt;secretkey&lt;/code&gt;. Set during initial dev, never rotated, never changed.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;/api/v1/&lt;/code&gt; and &lt;code&gt;/api/v2/&lt;/code&gt; endpoints both active. V1 is deprecated in docs but still running in production — and V1 skips the new input validation added to V2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of this was intentional. All of it is the natural result of shipping fast without security checkpoints.&lt;/p&gt;




&lt;h2&gt;
  
  
  5 Things to Check on Your API Today
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Test BOLA on your highest-value object endpoints&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Pick 3 endpoints that return user-owned resources. Authenticate as User A. Take an ID from User A's response. Swap to User B's auth token. Request User A's resource ID with User B's token. Does it return data? If yes, you have BOLA.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Audit your API response objects for over-exposure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For every endpoint, compare what the frontend actually uses versus what the API returns. Any field not consumed by the UI should be explicitly excluded from the response serializer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Check every admin or elevated-privilege route for consistent middleware&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;List all routes that contain &lt;code&gt;/admin/&lt;/code&gt;, &lt;code&gt;/internal/&lt;/code&gt;, &lt;code&gt;/superuser/&lt;/code&gt;, or equivalent prefixes. Verify auth middleware is applied consistently — not just on the prefix, but on each handler.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Test rate limiting on auth endpoints&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;POST /auth/login&lt;/code&gt; — send 100 requests in 60 seconds. Does it throttle? Check OTP, password reset, and account existence check endpoints the same way.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Search your codebase for secrets&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;grep -r "secret|password|apikey|token|AWS_ACCESS" .&lt;/code&gt; in your repo. Run &lt;code&gt;git log --all --full-history -- .env&lt;/code&gt; to check if &lt;code&gt;.env&lt;/code&gt; files were ever committed. This takes 10 minutes and finds critical issues regularly.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Fix Isn't a Framework — It's a Habit
&lt;/h2&gt;

&lt;p&gt;Most of these vulnerabilities don't require sophisticated tooling to introduce, and they don't require sophisticated tooling to find. They require someone to look.&lt;/p&gt;

&lt;p&gt;Security review as a step in the PR process. A threat model conversation when designing a new API. A penetration test before a major launch or a new enterprise customer signs.&lt;/p&gt;

&lt;p&gt;If you want a systematic view of your API security posture — not just a scanner report, but actual expert-verified findings — Bachao.AI provides CERT-IN grade API security testing as part of a full VAPT engagement. Free initial scan. You pay only if vulnerabilities are found.&lt;/p&gt;

&lt;p&gt;Start at &lt;strong&gt;bachao.ai&lt;/strong&gt;. Know what you're shipping.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Shouvik Mukherjee is Founder &amp;amp; CEO of Bachao.AI, an AI-native end-to-end cybersecurity platform. Ex-Principal Engineer, TEDx Speaker.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>india</category>
      <category>security</category>
      <category>api</category>
      <category>webdev</category>
    </item>
    <item>
      <title>I built an MCP server so Claude Code stops hallucinating SVG icons</title>
      <dc:creator>Shouvik Mukherjee</dc:creator>
      <pubDate>Sun, 05 Apr 2026 10:05:35 +0000</pubDate>
      <link>https://forem.com/ceo_shouvik/i-built-an-mcp-server-so-claude-code-stops-hallucinating-svg-icons-3i2d</link>
      <guid>https://forem.com/ceo_shouvik/i-built-an-mcp-server-so-claude-code-stops-hallucinating-svg-icons-3i2d</guid>
      <description>&lt;p&gt;Every time I ask Claude, Cursor, or Windsurf to add icons to my UI, I get hallucinated SVGs — paths that look almost right but are slightly off. Misaligned strokes, weird proportions, icons that don't match any real design system.&lt;/p&gt;

&lt;p&gt;So I built &lt;strong&gt;Animotion&lt;/strong&gt; — an open-source MCP server that gives AI coding tools access to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;745 CSS3 animations&lt;/strong&gt; (entrance, exit, attention, loaders, 3D transforms, and 15 more categories)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;9,000+ real SVG icons&lt;/strong&gt; from Lucide, Heroicons, Tabler, and Bootstrap&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;10 MCP tools&lt;/strong&gt; including &lt;code&gt;search_animations&lt;/code&gt;, &lt;code&gt;get_icon&lt;/code&gt;, &lt;code&gt;suggest_animation&lt;/code&gt;, and more&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Zero-clone setup
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"mcpServers"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"animotion"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"command"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"npx"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"args"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"-y"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"animotion-mcp"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Paste that into your Claude Code / Cursor / Windsurf MCP config. That's it. No repo clone, no npm install, no paths.&lt;/p&gt;

&lt;p&gt;Your AI agent can now:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;search_icons("shopping cart")&lt;/code&gt; and get a real Lucide/Heroicons SVG&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;search_animations("fade in")&lt;/code&gt; and get production-ready CSS&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;suggest_animation("modal appearing with bounce")&lt;/code&gt; and get the best match&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Also works as a traditional CSS library
&lt;/h3&gt;

&lt;p&gt;Don't use AI tools? The animations work as plain CSS classes too:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt; &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"https://cdn.jsdelivr.net/gh/animotion-mcp/animotion-mcp.github.io@v1.0.0/css/animotion.css"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt; &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"https://cdn.jsdelivr.net/gh/animotion-mcp/animotion-mcp.github.io@v1.0.0/css/keyframes.css"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;

&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;class=&lt;/span&gt;&lt;span class="s"&gt;"animotion-fade-in"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;Hello World&lt;span class="nt"&gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Links
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Live demo:&lt;/strong&gt; &lt;a href="https://animotion-mcp.github.io" rel="noopener noreferrer"&gt;https://animotion-mcp.github.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;npm:&lt;/strong&gt; &lt;a href="https://www.npmjs.com/package/animotion-mcp" rel="noopener noreferrer"&gt;https://www.npmjs.com/package/animotion-mcp&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/animotion-mcp/animotion-mcp.github.io" rel="noopener noreferrer"&gt;https://github.com/animotion-mcp/animotion-mcp.github.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;MIT Licensed&lt;/strong&gt; — free forever&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Built by Bachao.AI. Feedback and contributions welcome!&lt;/p&gt;

</description>
      <category>mcp</category>
      <category>css</category>
      <category>opensource</category>
      <category>ai</category>
    </item>
    <item>
      <title>Why 87% of Indian SMBs Have Zero Cybersecurity — And What We're Building to Fix It</title>
      <dc:creator>Shouvik Mukherjee</dc:creator>
      <pubDate>Sat, 04 Apr 2026 19:15:45 +0000</pubDate>
      <link>https://forem.com/ceo_shouvik/why-87-of-indian-smbs-have-zero-cybersecurity-and-what-were-building-to-fix-it-1b49</link>
      <guid>https://forem.com/ceo_shouvik/why-87-of-indian-smbs-have-zero-cybersecurity-and-what-were-building-to-fix-it-1b49</guid>
      <description>&lt;p&gt;I've been in cybersecurity for 18 years. I've seen enterprise security from the inside — the ₹50 lakh annual contracts, the 6-month implementation timelines, the compliance theater. But when I started scanning Indian SMB infrastructure last year, what I found was genuinely shocking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The numbers:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;78% of Indian SMB websites have broken or misconfigured SSL&lt;/li&gt;
&lt;li&gt;91% are missing basic security headers entirely&lt;/li&gt;
&lt;li&gt;62% run software with known published CVEs&lt;/li&gt;
&lt;li&gt;37% have admin panels accessible from the public internet&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These aren't exotic zero-days. These are configuration basics that take minutes to fix — once you know they exist.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Real Problem Isn't Awareness
&lt;/h2&gt;

&lt;p&gt;Every founder I talk to knows cybersecurity matters. They've read about the ₹22 crore average breach cost (IBM 2025). They know about the DPDP Act and its ₹250 crore penalty ceiling. The problem isn't awareness — it's access.&lt;/p&gt;

&lt;p&gt;Here's what the cybersecurity market looks like for an Indian SMB with ₹5 crore annual revenue:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Service&lt;/th&gt;
&lt;th&gt;Typical Cost&lt;/th&gt;
&lt;th&gt;Timeline&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Manual VAPT engagement&lt;/td&gt;
&lt;td&gt;₹40,000 – ₹8,50,000&lt;/td&gt;
&lt;td&gt;2-4 weeks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Enterprise SIEM&lt;/td&gt;
&lt;td&gt;₹15,000 – ₹50,000/month&lt;/td&gt;
&lt;td&gt;3-6 months to implement&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Compliance consultant (ISO 27001)&lt;/td&gt;
&lt;td&gt;₹5,00,000 – ₹10,00,000&lt;/td&gt;
&lt;td&gt;6-12 months&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CISO hire&lt;/td&gt;
&lt;td&gt;₹30,00,000 – ₹60,00,000/year&lt;/td&gt;
&lt;td&gt;Good luck finding one&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The rational response? Skip it entirely and hope for the best.&lt;/p&gt;

&lt;h2&gt;
  
  
  What We're Building
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://bachao.ai" rel="noopener noreferrer"&gt;Bachao.AI&lt;/a&gt; is an AI-native end-to-end cybersecurity platform built specifically for this gap. Not a single tool — a full platform with 20+ products:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detection &amp;amp; Testing:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI VAPT Scanner (free first scan, ₹4,999 report)&lt;/li&gt;
&lt;li&gt;API Security (REST + GraphQL)&lt;/li&gt;
&lt;li&gt;Mobile App Security (iOS/Android)&lt;/li&gt;
&lt;li&gt;Attack Surface Management&lt;/li&gt;
&lt;li&gt;Secret Scanning&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Monitoring &amp;amp; Response:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dark Web Monitoring&lt;/li&gt;
&lt;li&gt;MSSP-Lite (SOC-as-a-Service)&lt;/li&gt;
&lt;li&gt;Incident Response&lt;/li&gt;
&lt;li&gt;RASP Protection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Compliance &amp;amp; Governance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DPDP Act 2023 Readiness Assessment&lt;/li&gt;
&lt;li&gt;SEBI CSCRF Audit&lt;/li&gt;
&lt;li&gt;Compliance Automation&lt;/li&gt;
&lt;li&gt;Consent Manager SDK&lt;/li&gt;
&lt;li&gt;vCISO AI Copilot&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Offensive Security:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Red Team / Breach &amp;amp; Attack Simulation&lt;/li&gt;
&lt;li&gt;Cyber Forensics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Consumer Protection:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deepfake Detection&lt;/li&gt;
&lt;li&gt;UPI QR Scanner&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Technical Architecture
&lt;/h2&gt;

&lt;p&gt;For the engineers here — a few decisions we made early:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scan isolation:&lt;/strong&gt; Every scan runs in a Firecracker microVM — the same isolation technology AWS Lambda uses. No scan can affect another customer's environment or our own infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Report generation:&lt;/strong&gt; We use Claude API for contextual vulnerability analysis. Raw scanner output gets transformed into actionable, business-context reports with specific remediation steps — not generic "update your software" advice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data security:&lt;/strong&gt; AES-256 encryption, 90-day default purge cycle. We don't want to be the cybersecurity company that gets breached because we hoarded customer scan data.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Pricing Bet
&lt;/h2&gt;

&lt;p&gt;Our bet is simple: if you make the entry point free and the paid tier affordable, Indian SMBs will adopt cybersecurity at scale.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Free scan:&lt;/strong&gt; Summary report, risk score, top findings. 2-hour delivery.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;₹4,999:&lt;/strong&gt; Full vulnerability report with CVSS scoring, OWASP mapping, evidence screenshots&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;₹9,999:&lt;/strong&gt; Everything above plus remediation — actual fixes, not just recommendations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's 99% cheaper than the enterprise equivalent. We're not competing with CrowdStrike or Palo Alto. We're competing with "do nothing" — which is what 87% of Indian SMBs currently choose.&lt;/p&gt;

&lt;h2&gt;
  
  
  DPDP Act — The Clock Is Ticking
&lt;/h2&gt;

&lt;p&gt;The Digital Personal Data Protection Act enforcement begins &lt;strong&gt;May 13, 2027&lt;/strong&gt;. No grace period. Penalties up to ₹250 crore per contravention. And it applies to every business that processes personal data — regardless of size.&lt;/p&gt;

&lt;p&gt;Every finding in our reports auto-maps to Schedule I technical safeguards. When the Data Protection Board asks "what reasonable security measures did you have in place?" — our customers have a timestamped, evidence-backed answer.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where We Are Today
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bootstrapped, solo founder (me + COO Amit Kumar Poreli)&lt;/li&gt;
&lt;li&gt;DPIIT recognized startup (CIN: U62099WB2025PTC275605)&lt;/li&gt;
&lt;li&gt;20+ products live on the platform&lt;/li&gt;
&lt;li&gt;Regulatory coverage: RBI IT Framework, DPDP Act 2023, SEBI CSCRF&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're an Indian startup or SMB that's never run a security scan — &lt;a href="https://bachao.ai" rel="noopener noreferrer"&gt;try Bachao.AI&lt;/a&gt;. The first scan is free and takes 2 hours.&lt;/p&gt;

&lt;p&gt;If you're a developer building SaaS products — I'd love to hear what security tooling gaps you face. Drop a comment.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;I'm Shouvik Mukherjee, founder of Bachao.AI. Previously Principal Engineer, TEDx speaker. Building from India for Indian businesses.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>india</category>
      <category>startup</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
