Source code analysis (SCA) is the strategic review of a piece of software’s code to identify potential security vulnerabilities. Typically, hackers try to use embedded code or exploit flaws in software to gain control of the company’s computers and get access to confidential information and customer records. In this regard, a timely source code review helps developers to remediate security bugs and save overhead costs.

What we offer

Our team has extensive programming experience that allows us to review your internally developed applications before deployment and find and fix software vulnerabilities before they can be exploited for malicious purposes.

Through source code analysis we will detect more vulnerabilities than during traditional black-box security tests, which will make your solutions safer. Although, the process of SCA is ideal in combination with penetration testing to achieve the result that delivers maximum security.

How we do it

Source code analysis is performed by team members qualified in software security. During audits, we use dynamic and static analysis tools that allow us to improve the effectiveness of the service. We also offer manual SCA wherever it is requested or required for security problems.

During analysis, some of the techniques we use are Data Flow Analysis, Taint and Lexical Analysis, Reverse Engineering, Model Checking, Control Flow Graphics, Metric Computation, and Hoare Logic.

We examine a number of problem areas including but not limited to:

  • Incorrect configurations:
  • server (web.xml, web.config, config.php, machine.config, etc.)
  • logging (log4net, log4j, log4php, etc.)
  • framework (Spring, Struts, Hibernate, NHibernate, etc.)
  • Incorrect use of validators
  • Inadequate cryptography
  • Insecure session management
  • Cross-site scripting through incorrect response data validation in the HTML generated
  • SQL, XPATH, LDAP, and other command injections
  • Insecure shell and API calls

 Common vulnerability types we typically detect:

  • Buffer Overflow
  • Race Conditions
  • Dangling Pointers
  • Remote Code Execution
  • Format String Attacks
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (XSRF)
  • SQL Injection
  • Code Injection
  • Directory Traversal
  • Local/Remote File Inclusion
  • Denial of Service

What you get

You will receive a comprehensive report describing every problem area tested and highlighting the corresponding points in the source code. We will also provide you with general information and advice on best practices to solve the identified issues.