SECURE CODING(PC)
SECURE CODING
It's possible to analyze security weaknesses with a high degree of accuracy using only the source-code, without the build process or having to construct a development environment.
Connection data related to project security weakness is intuitively presented.
Users are able to apply exceptions to certain rules, and able to apply personalized rules.
Analyzed results are available in a variety of different formats including PDF, XLS, and DOC.
Function | Description |
---|---|
Compliant with various evaluation criteria |
Supports compliance with 47 software development security guide items, software development security guide 49 items, NIS web 8 major security vulnerabilities, 8 electronic financial supervisory regulations, OWASP TOP 10, OWASP MOBILE TOP 10, CWE/SANS TOP 25, etc. |
Supports for various programming languages |
Support multiple languages including Java, JAVASCRIPT, JSP, ASP, ASP.NET, HTML, C/C++, C#, Python, XML, IOS, NEXACRO, etc.
![]() |
User-defined rules | User-defined rules via GUI are available in addition to the system rules provided as default |