<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jwalden</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jwalden"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jwalden"/>
		<updated>2026-05-07T05:41:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=7011</id>
		<title>Steps and Roles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=7011"/>
				<updated>2006-06-29T11:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roles==&lt;br /&gt;
&lt;br /&gt;
Code reviews are carried out by personnel in four roles: author, moderator, reader, and scribe.  There are typically reviewers who are simply inspectors, focused on finding defects in the code, who do not fit in any of the four roles.  Depending on the size of your inspection team and the formality of your inspection process, some people may serve in multiple roles at the same time.  However, if you have a large enough team, it is useful to assign each role to a different person so each person can focus on their duties.&lt;br /&gt;
&lt;br /&gt;
#'''Moderator''': The Moderator is the key role in a code review.  The moderator is responsible for selecting a team of reviewers, scheduling the code review meeting, conducting the meeting, and working with the author to ensure that necessary corrections are made to the reviewed document. &lt;br /&gt;
#'''Author''': The Author wrote the code that is being reviewed.  The author is responsible for starting the code review process by finding a Moderator.  The role of Author must be separated from that of Moderator, Reader, or Recorder to ensure the objectivity and effectiveness of the code review.  However, the Author serves an essential role in answering questions and making clarifications during the review and making corrections after the review. &lt;br /&gt;
#'''Reader''': The Reader presents the code during the meeting by paraphrasing it in his own words.  It's important to separate the role of Reader from Author, because it's too easy for an author to explain what he meant the code to do instead of explaining what it actually does.  The reader's interpretation of the code can reveal ambiguities, hidden assumptions, poor documentation and style, and other errors that the Author would not be likely to catch on his own.&lt;br /&gt;
#'''Scribe''': The Scribe records all issues raised during the code review.  Separating the role of Scribe from the other roles allows the other reviewers to focus their entire attention on the code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Steps==&lt;br /&gt;
&lt;br /&gt;
Code reviews consist of the following four steps:&lt;br /&gt;
&lt;br /&gt;
#'''Initialization''': The Author informs a Moderator that a deliverable will be ready for inspection in the near future.  The Moderator selects a team of inspectors and assigns roles to them.  The Author and the Moderator together prepare a review package consisting fo the code to be reviewed, documentation, review checklists, coding rules, and other materials such as the output of static analysis tools.  The Moderator will announce the time, place, and duration for the code review meeting.&lt;br /&gt;
#'''Preparation''': After receiving the review package, the inspectors study the code individually to search for defects.  Preparation should take about as long as the duration of the meeting.  Some less formal code review techniques skip the preparation phase.&lt;br /&gt;
#'''Meeting''': The Moderator initiates the meeting, then the Reader describes the code to the participants.  After each segment of code is presented, reviewers will bring up any issues they found during Preparation or discovered during the meeting.  The interaction between reviewers during the meeting will usually bring up issues that were not discovered during the Preparation step.  The Scribe notes each defect with enough detail for the Author to address it afterwards.  It is the responsibility of the Moderator to keep the meting focused on defects, ensuring that the participants do not attempt to produce solutions during the meeting instead.  Some less formal code review steps skip the meeting phase, choosing instead to e-mail the code to one or more reviewers who return comments without ever meeting as a group.&lt;br /&gt;
#'''Corrections''': The Author addresses the defects recorded during the meeting, and the Moderator checks the corrections to ensure that all problems are resolved.  If the number of defects raised was large, the Moderator may decide to schedule a review of the revised code.&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=7010</id>
		<title>Steps and Roles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=7010"/>
				<updated>2006-06-29T11:37:02Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==Steps==&lt;br /&gt;
&lt;br /&gt;
Code reviews consist of the following four steps:&lt;br /&gt;
&lt;br /&gt;
#Initialization&lt;br /&gt;
#Preparation&lt;br /&gt;
#Meeting&lt;br /&gt;
#Corrections&lt;br /&gt;
&lt;br /&gt;
==Roles==&lt;br /&gt;
&lt;br /&gt;
Code reviews are carried out by personnel in four roles: author, moderator, reader, and recorder.  Depending on the size of your inspection team and the formality of your inspection process, some people may serve in multiple roles at the same time.  However, if you have a large enough team, it is useful to assign each role to a different person so each person can focus on their duties.&lt;br /&gt;
&lt;br /&gt;
#'''Moderator''': The Moderator is the key role in a code review.  The moderator is responsible for selecting a team of reviewers, scheduling the code review meeting, conducting the meeting, and working with the author to ensure that necessary corrections are made to the reviewed document. &lt;br /&gt;
#'''Author''': The Author wrote the code that is being reviewed.  The author is responsible for starting the code review process by finding a Moderator.  The role of Author must be separated from that of Moderator, Reader, or Recorder to ensure the objectivity and effectiveness of the code review.  However, the Author serves an essential role in answering questions and making clarifications during the review and making corrections after the review. &lt;br /&gt;
#'''Reader''': The Reader presents the code during the meeting by paraphrasing it in his own words.  It's important to separate the role of Reader from Author, because it's too easy for an author to explain what he meant the code to do instead of explaining what it actually does.  The reader's interpretation of the code can reveal ambiguities, hidden assumptions, poor documentation and style, and other errors that the Author would not be likely to catch on his own.&lt;br /&gt;
#'''Scribe''': The Scribe records all issues raised during the code review.  Separating the role of Scribe from the other roles allows the other reviewers to focus their entire attention on the code.&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=References&amp;diff=6976</id>
		<title>References</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=References&amp;diff=6976"/>
				<updated>2006-06-28T12:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
# Brian Chess and Gary McGraw.  &amp;quot;Static Analysis for Security,&amp;quot; ''IEEE Security &amp;amp; Privacy'' 2(6), 2004, pp. 76-79.&lt;br /&gt;
# M. E. Fagan.  &amp;quot;Design and Code Inspections to Reduce Errors in Program Development,&amp;quot; ''IBM Systems J.'' 15(3), 1976, pp. 182-211.&lt;br /&gt;
# Tom Gilb and Dorothy Graham.  ''Software Inspection''.  Addison-Wesley, Wokingham, England, 1993.&lt;br /&gt;
# Michael Howard and David LeBlanc.  ''Writing Secure Code, 2nd edition''.  Microsoft Press, Redmond, WA, 2003.&lt;br /&gt;
# Gary McGraw.  ''Software Security''.  Addison-Wesley, Boston, MA, 2006.&lt;br /&gt;
# Diomidis Spinellis.  ''Code Reading: The Open Source Perspective''.  Addison-Wesley, Boston, MA, 2003.&lt;br /&gt;
# John Viega and Gary McGraw.  ''Building Secure Software: How to Avoid Security Problems the Right Way.''  Addison-Wesley, Boston, MA, 2001.&lt;br /&gt;
# Karl E. Wiegers.  ''Peer Reviews in Software''.  Addison-Wesley, Boston, MA, 2002.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=6975</id>
		<title>Steps and Roles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Steps_and_Roles&amp;diff=6975"/>
				<updated>2006-06-28T12:42:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==Steps==&lt;br /&gt;
&lt;br /&gt;
Code reviews consist of the following four steps:&lt;br /&gt;
&lt;br /&gt;
#Initialization&lt;br /&gt;
#Preparation&lt;br /&gt;
#Meeting&lt;br /&gt;
#Corrections&lt;br /&gt;
&lt;br /&gt;
==Roles==&lt;br /&gt;
&lt;br /&gt;
Code reviews are carried out by personnel in four roles: author, moderator, reader, and recorder.  Depending on the size of your inspection team and the formality of your inspection process, some people may serve in multiple roles at the same time.  However, if you have a large enough team, it is useful to assign each role to a different person so each person can focus on their duties.&lt;br /&gt;
&lt;br /&gt;
#Moderator&lt;br /&gt;
#Author&lt;br /&gt;
#Reader&lt;br /&gt;
#Recorder&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6974</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6974"/>
				<updated>2006-06-28T12:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
==[[Steps and Roles]]==&lt;br /&gt;
==[[Code Review Processes]]==&lt;br /&gt;
==Checklists==&lt;br /&gt;
#[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]]&lt;br /&gt;
#[[OS Injection]]&lt;br /&gt;
#[[SQL Injection]]&lt;br /&gt;
#[[Data Validation (Code Review)|Data Validation]]&lt;br /&gt;
#[[Error Handling]]&lt;br /&gt;
#[[The Secure Code Environment]]&lt;br /&gt;
#[[Transaction Analysis]]&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
==[[References]]==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=References&amp;diff=6973</id>
		<title>References</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=References&amp;diff=6973"/>
				<updated>2006-06-28T12:34:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
# Brian Chess and Gary McGraw.  &amp;quot;Static Analysis for Security,&amp;quot; ''IEEE Security &amp;amp; Privacy'' 2(6), 2004, pp. 76-79.&lt;br /&gt;
# M. E. Fagan.  &amp;quot;Design and Code Inspections to Reduce Errors in Program Development,&amp;quot; ''IBM Systems J.'' 15(3), 1976, pp. 182-211.&lt;br /&gt;
# Tom Gilb and Dorothy Graham.  ''Software Inspection''.  Addison-Wesley, Wokingham, England, 1993.&lt;br /&gt;
# Michael Howard and David LeBlanc.  ''Writing Secure Code, 2nd edition''.  Microsoft Press, Redmond, WA, 2003.&lt;br /&gt;
# Gary McGraw.  ''Software Security''.  Addison-Wesley, Boston, MA, 2006.&lt;br /&gt;
# John Viega and Gary McGraw.  ''Building Secure Software: How to Avoid Security Problems the Right Way.''  Addison-Wesley, Boston, MA, 2001.&lt;br /&gt;
# Karl E. Wiegers.  ''Peer Reviews in Software''.  Addison-Wesley, Boston, MA, 2002.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Security_Code_Review_in_the_SDLC&amp;diff=6972</id>
		<title>Security Code Review in the SDLC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Security_Code_Review_in_the_SDLC&amp;diff=6972"/>
				<updated>2006-06-28T12:32:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==Preface==&lt;br /&gt;
&lt;br /&gt;
Code reviews vary widely in their level of formality.  Reviews can be as informal as inviting a friend to help look for a hard to find bug, and they can be as formal as a software inspection process with trained teams, assigned roles and responsibilities, and a formal metric and quality tracking program.&lt;br /&gt;
&lt;br /&gt;
In ''Peer Reviews in Software,'' Karl Wiegers lists seven review processes from least to most formal:&lt;br /&gt;
&lt;br /&gt;
# Ad hoc review&lt;br /&gt;
# Passaround&lt;br /&gt;
# Pair programming&lt;br /&gt;
# Walkthrough&lt;br /&gt;
# Team review&lt;br /&gt;
# Inspection&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6971</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6971"/>
				<updated>2006-06-28T12:27:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
==[[Code Review Processes]]==&lt;br /&gt;
==Checklists==&lt;br /&gt;
#[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]]&lt;br /&gt;
#[[OS Injection]]&lt;br /&gt;
#[[SQL Injection]]&lt;br /&gt;
#[[Data Validation (Code Review)|Data Validation]]&lt;br /&gt;
#[[Error Handling]]&lt;br /&gt;
#[[The Secure Code Environment]]&lt;br /&gt;
#[[Transaction Analysis]]&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
==[[References]]==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=References&amp;diff=6967</id>
		<title>References</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=References&amp;diff=6967"/>
				<updated>2006-06-28T12:10:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;# Brian Chess and Gary McGraw.  &amp;quot;Static Analysis for Security,&amp;quot; ''IEEE Security &amp;amp; Privacy'' 2(6), 2004, pp. 76-79.&lt;br /&gt;
# M. E. Fagan.  &amp;quot;Design and Code Inspections to Reduce Errors in Program Development,&amp;quot; ''IBM Systems J.'' 15(3), 1976, pp. 182-211.&lt;br /&gt;
# Tom Gilb and Dorothy Graham.  ''Software Inspection''.  Addison-Wesley, Wokingham, England, 1993.&lt;br /&gt;
# Michael Howard and David LeBlanc.  ''Writing Secure Code, 2nd edition''.  Microsoft Press, Redmond, WA, 2003.&lt;br /&gt;
# Gary McGraw.  ''Software Security''.  Addison-Wesley, Boston, MA, 2006.&lt;br /&gt;
# John Viega and Gary McGraw.  ''Building Secure Software: How to Avoid Security Problems the Right Way.''  Addison-Wesley, Boston, MA, 2001.&lt;br /&gt;
# Karl E. Wiegers.  ''Peer Reviews in Software''.  Addison-Wesley, Boston, MA, 2002.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6966</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6966"/>
				<updated>2006-06-28T12:10:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
==[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]] ==&lt;br /&gt;
&lt;br /&gt;
==[[OS Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[SQL Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[Data Validation (Code Review)|Data Validation]] ==&lt;br /&gt;
==[[Error Handling]]==&lt;br /&gt;
==[[The Secure Code Environment]] ==&lt;br /&gt;
==[[Transaction Analysis]] ==&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
==[[References]]==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6965</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6965"/>
				<updated>2006-06-28T12:09:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
==[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]] ==&lt;br /&gt;
&lt;br /&gt;
==[[OS Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[SQL Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[Data Validation (Code Review)|Data Validation]] ==&lt;br /&gt;
==[[Error Handling]]==&lt;br /&gt;
==[[The Secure Code Environment]] ==&lt;br /&gt;
==[[Transaction Analysis]] ==&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
==[[References]]==&lt;br /&gt;
# Brian Chess and Gary McGraw.  &amp;quot;Static Analysis for Security,&amp;quot; ''IEEE Security &amp;amp; Privacy'' 2(6), 2004, pp. 76-79.&lt;br /&gt;
# M. E. Fagan.  &amp;quot;Design and Code Inspections to Reduce Errors in Program Development,&amp;quot; ''IBM Systems J.'' 15(3), 1976, pp. 182-211.&lt;br /&gt;
# Tom Gilb and Dorothy Graham.  ''Software Inspection''.  Addison-Wesley, Wokingham, England, 1993.&lt;br /&gt;
# Michael Howard and David LeBlanc.  ''Writing Secure Code, 2nd edition''.  Microsoft Press, Redmond, WA, 2003.&lt;br /&gt;
# Gary McGraw.  ''Software Security''.  Addison-Wesley, Boston, MA, 2006.&lt;br /&gt;
# John Viega and Gary McGraw.  ''Building Secure Software: How to Avoid Security Problems the Right Way.''  Addison-Wesley, Boston, MA, 2001.&lt;br /&gt;
# Karl E. Wiegers.  ''Peer Reviews in Software''.  Addison-Wesley, Boston, MA, 2002.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6964</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6964"/>
				<updated>2006-06-28T11:52:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
==[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]] ==&lt;br /&gt;
&lt;br /&gt;
==[[OS Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[SQL Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[Data Validation (Code Review)|Data Validation]] ==&lt;br /&gt;
==[[Error Handling]]==&lt;br /&gt;
==[[The Secure Code Environment]] ==&lt;br /&gt;
==[[Transaction Analysis]] ==&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;br /&gt;
==[[References]]==&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Code_Review&amp;diff=6963</id>
		<title>Automated Code Review</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Code_Review&amp;diff=6963"/>
				<updated>2006-06-28T11:50:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
&lt;br /&gt;
==Preface==&lt;br /&gt;
&lt;br /&gt;
While manual code reviews can find security flaws in code, they suffer from two problems.  Manual code reviews are slow, covering 100-200 lines per hour on average.  Also, there are hundreds of security flaws to look for in code, while humans can only keep about seven items in memory at once.  Source code analysis tools can search a program for hundreds of different security flaws at once at a rate far greater than any human can review code.  However, these tools don't eliminate the need for a human reviewer, as they produce both false positive and false negative results.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6962</id>
		<title>OWASP Code Review Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_Guide_Table_of_Contents&amp;diff=6962"/>
				<updated>2006-06-28T11:42:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jwalden: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==[[Code Review Introduction|Introduction]] ==&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
==[[Buffer Overruns and Overflows|Buffer Overruns and Overflows]] ==&lt;br /&gt;
&lt;br /&gt;
==[[OS Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[SQL Injection]] ==&lt;br /&gt;
&lt;br /&gt;
==[[Data Validation (Code Review)|Data Validation]] ==&lt;br /&gt;
==[[Error Handling]]==&lt;br /&gt;
==[[The Secure Code Environment]] ==&lt;br /&gt;
==[[Transaction Analysis]] ==&lt;br /&gt;
==[[Automating Code Reviews]] ==&lt;/div&gt;</summary>
		<author><name>Jwalden</name></author>	</entry>

	</feed>