Source Code Review

On-Demand Code Review.

If you’re looking for a security review of your application code we have cost-effective solutions to help.

Dynamic Application Security Testing (DAST)

The DAST approach to application testing scans to find vulnerabilities that a hacker could potentially exploit. We evaluate your web application in its native running state. We start by looking at your application as an anonymous user, then as an authenticated user, and finally as an administrator or power user. Testing examines the front-end interface.

A DAST test is known as a black box source code test because it is performed through the application front end and does not have a view into the internal source code.  This type of testing most similarly mirrors the techniques used by attacker to find potential weaknesses.  A DAST test can look for a range of vulnerabilities including input/output validation issues, cross-site scripting, SQL injection, and other issues stemming from misconfiguration.

Static Application Security Testing (SAST)

The SAST approach to application testing looks for vulnerabilities in the source code. SAST testing requires access to the application’s source code. This is considered a real-time security view of your application inner-workings. Through this test, we can also see what information is being shared with integrated API’s. With API information, we can identify security or data violations.

A SAST test is known as a white box source code test because it is performed by constructing code binaries to scan the full application including security of microservices, APIs, data flows through 3rd party libraries, and limited use object classes.

Utilizing Veracode’s static code analysis software, we assess common application codes including:

  • Java
  • .NET
  • JavaScript & TypeScript (including AngularJS, Node.js, and jQuery)
  • Python, Perl, PHP, Ruby on Rails, Scala, ColdFusion, Classic ASP
  • iOS (Objective-C and Swift), Android (Java), PhoneGap, Cordova, Titanium, Xamarin
  • C/C++ (Windows, RedHat Linux, OpenSUSE, Solaris)
  • COBOL, RPG, Visual Basic 6

Recent Blog Posts

How Can Infrastructure Penetration Testing Help Your Business?

An Infrastructure Penetration Test is one of the best ways to discover weaknesses, vulnerabilities, misconfigurations, and threats located within your infrastructure. To conduct a Penetration Test, highly skilled engineers utilize the same tactics, techniques, and...

Exim Server Vulnerabilities

By: Justin Fimlaid What is an Exim server? An Exim server is a mail transfer agent used on Linux like operating systems. Exim is a free software and used by as much as 57% of the Internet email servers. Over the past couple weeks it has been noted that a heavy amount...

What is a SHA-1 Collision Attack?

By: Justin Fimlaid What is SHA-1 and what is the history of SHA-1? Originally SHA-1 was developed as part of a U.S. government capstone project. The first version of SHA was SHA-0 and that was developed in 1993 as the Secure Hash Standard. SHA-0 was originally...

Got Code to Review?

Pin It on Pinterest