How to Scope a Web Application Penetration Test | Lorikeet Security Skip to main content
Back to Blog

How to Scope a Web Application Penetration Test

Lorikeet Security Team March 19, 2026 10 min read

The scope of a penetration test determines everything: what gets tested, how long the engagement takes, what it costs, and whether the results are meaningful. A poorly scoped pentest wastes money by testing the wrong things or missing critical areas. A well-scoped pentest delivers maximum security value for every dollar spent.

This guide walks you through the scoping process step by step, covering what information your provider needs, how to define boundaries, and common scoping mistakes that lead to ineffective assessments.


What your pentest provider needs to know

Before a provider can give you an accurate scope and quote, they need to understand your application. Here is the information you should prepare for the scoping conversation.

Application overview

API details

Business context


Defining what is in scope

The scope should cover everything that matters for your security posture. For most web applications, that means the following areas.

All user-facing functionality. Every feature that any user role can access, from the login page to the deepest admin function. Excluding features from scope means excluding them from security coverage.

The complete API surface. Not just the endpoints the frontend calls, but all endpoints that exist in production. This includes legacy endpoints, admin APIs, and undocumented functionality.

Authentication and authorization. The full authentication lifecycle (registration, login, password reset, session management, logout) and the authorization model (every endpoint tested against every role).

Third-party integrations. Webhook endpoints, OAuth flows, payment processing, file import/export, and any other integration points where external data enters your application.

Scoping rule of thumb: If it is accessible from the internet and it handles your data or your customers' data, it should be in scope. The goal is to test your application the way an attacker would target it, and attackers do not respect scope exclusions.


Common scoping mistakes


How scope affects cost and timeline

Pentest pricing is driven by effort, and effort is driven by scope. A tighter scope means less testing time and lower cost, but also less coverage. The goal is to find the scope that covers your critical risk areas without paying for testing you do not need.

For most SaaS companies, the sweet spot is a comprehensive assessment of the core application and API that covers all user roles and critical business logic. This typically results in an engagement of 7 to 15 testing days at a cost of $7,500 to $20,000.

If budget is a constraint, work with your provider to prioritize. Focus on authentication, authorization, and the features that handle the most sensitive data. A focused assessment of your highest-risk areas is more valuable than a shallow assessment of everything.


How Lorikeet Security handles scoping

At Lorikeet Security, scoping is a collaborative process. We schedule a 30-minute call where we walk through your application together, understand your architecture, discuss your compliance requirements, and identify your highest-risk areas. Based on that conversation, we provide a detailed scope document that specifies exactly what will be tested, how long it will take, and what it will cost.

There are no surprises. The scope document becomes part of the engagement agreement, and any changes are discussed and agreed upon before testing begins. Our web application pentests start at $7,500, with pricing that scales predictably based on application complexity.

Need Help Scoping Your Pentest?

Schedule a free 30-minute scoping call. We will review your application, recommend the right scope, and provide a detailed quote within 24 hours.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!