It's possible to analyze security weaknesses with a high degree of accuracy using only the source-code, without the build process or having to construct a development environment.
Connection data related to project security weakness is intuitively presented.
Users are able to apply exceptions to certain rules, and able to apply personalized rules.
Analyzed results are available in a variety of different formats including PDF, XLS, and DOC.
various evaluation criteria
|Supports compliance with 47 software development security guide items, software development security guide 49 items, NIS web 8 major security vulnerabilities, 8 electronic financial supervisory regulations, OWASP TOP 10, OWASP MOBILE TOP 10, CWE/SANS TOP 25, etc.|
various programming languages
|User-defined rules||User-defined rules via GUI are available in addition to the system rules provided as default|