SAST Code Verification
SAST Code Verification
Contributor(s): Dave Wichers, itamarlavender, will-obrien, Eitan Worcel, Prabhu Subramanian, kingthorin, coadaflorin,
hblankenship, GovorovViva64, pfhorman, GouveaHeitor, Clint Gibler, DSotnikov, Ajin Abraham, Noam Rathaus, Mike
Jang
Source code analysis tools, also known as Static Application Security Testing (SAST) Tools,
can help analyze source code or compiled versions of code to help find security flaws.
SAST tools can be added into your IDE. Such tools can help you detect issues during
software development. SAST tool feedback can save time and effort, especially when
compared to finding vulnerabilities later in the development cycle.
Scales well – can be run on lots of software, and can be run repeatedly (as with
nightly builds or continuous integration).
Identifies certain well-known vulnerabilities, such as:
o Buffer overflows
o SQL injection flaws
Output helps developers, as SAST tools highlight the problematic code, by filename,
location, line number, and even the affected code snippet.
Weaknesses
Disclaimer
The tools listed in the tables below are presented in alphabetical order. OWASP does not
endorse any of the vendors or tools by listing them in the table below. We have made every
effort to provide this information as accurately as possible. If you are the vendor of a
tool below and think that this information is incomplete or incorrect, please send an e-
mail to our mailing list and we will make every effort to correct this information.