<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=MGHAZLI+Zyad</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=MGHAZLI+Zyad"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/MGHAZLI_Zyad"/>
		<updated>2026-05-14T09:48:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:MGHAZLI_Zyad&amp;diff=156532</id>
		<title>User:MGHAZLI Zyad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:MGHAZLI_Zyad&amp;diff=156532"/>
				<updated>2013-08-08T08:40:49Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Consultant at Solucom &lt;br /&gt;
 [http://www.Solucom.fr www.Solucom.fr]&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_WhatIsCodeReview&amp;diff=156531</id>
		<title>CRV2 WhatIsCodeReview</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_WhatIsCodeReview&amp;diff=156531"/>
				<updated>2013-08-08T08:26:39Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== What is Security Source Code Review? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Source code review is the practice of reviewing developed code for vulnerabilities. There are many ways to review the security of an application and it is recommended to perform more than one method to help ensure more assessment coverage. Penetration testing is great at finding certain bugs such as technical signature or API based issues. Issues related to privacy, information leakage, denial of service are more suited to code review. Source code review is also good practice as you are finding issues early in the SDLC. Locating and fixing issues early in your SDLC makes it cheaper in terms of effort and cost to remediate. It also empowers developers to understand security bugs at the source code level such that they may not repeat the same mistakes.&lt;br /&gt;
&lt;br /&gt;
== What is static analysis? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis is usually performed as part of a Source code review and is carried out at the Implementation phase of SDLC.  Static Code Analysis commonly refers to the running of static code analysis tools that attempts to highlight possible vulnerabilities whiting the ‘static’ (non-running) source code by using techniques such as Taint Analysis, Data Flow Analysis, Control Flow Graph, and Lexical Analysis. When the analysis is performed on a runtime environment, it is referred to as Dynamic Code Analysis.&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=156530</id>
		<title>CRV2 ManualReviewProsCons</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=156530"/>
				<updated>2013-08-08T08:22:05Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: Choosing a static analysis tool&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Manual Review - Pros and Cons =&lt;br /&gt;
&lt;br /&gt;
Add content here ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Choosing a static analysis tool ==&lt;br /&gt;
&lt;br /&gt;
Choosing a static analysis tool is a difficult task since there are a lot of choices. The comparison charts below should help you decide which tool is right for you. This list is not exhaustive.&lt;br /&gt;
The first thing to do is to look to for a tool that supports the programming language of your choice. You also have to decide whether you want a commercial tool or a free one. Usually the commercial tools have more features and are more reliable than the free ones. The major commercial tools are equally effective but their usability might differ. Next, there is the type of analysis you are looking for: Security or Quality, Static or Dynamic analysis. You should also check the compatibility of the tool with your programming environment.&lt;br /&gt;
This was the easy part to narrow the choice down to a few tools. The next step requires you to do some work since it is quite subjective. The best thing to do is to test a few tools to see if you are satisfied with different aspects such as the user experience, the reporting of vulnerabilities, the level of false positives, the customization, the customer support… The choice should not be based on the number of features, but on the features that you need and how they could be integrated in your SDLC. Also, before choosing the tool, the security expertise of the targeted users should be clearly evaluated in order to choose an appropriate tool.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Free static analysis tools''' ===&lt;br /&gt;
&lt;br /&gt;
[[File:Free_static_analysis_tools.png]]&lt;br /&gt;
[[File:Legend_free_static_analysis_tools.png]]&lt;br /&gt;
&lt;br /&gt;
=== '''Commerical static analysis tools''' ===&lt;br /&gt;
&lt;br /&gt;
[[File:Commercial_static_analysis_tools.png]]&lt;br /&gt;
[[File:Legend Commercial static analysis tools.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp_Benchmark_Static_analysis_tools.pptx]]&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_Benchmark_Static_analysis_tools.pptx&amp;diff=156529</id>
		<title>File:Owasp Benchmark Static analysis tools.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_Benchmark_Static_analysis_tools.pptx&amp;diff=156529"/>
				<updated>2013-08-08T08:12:36Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Legend_Commercial_static_analysis_tools.png&amp;diff=156528</id>
		<title>File:Legend Commercial static analysis tools.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Legend_Commercial_static_analysis_tools.png&amp;diff=156528"/>
				<updated>2013-08-08T08:11:01Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Commercial_static_analysis_tools.png&amp;diff=156527</id>
		<title>File:Commercial static analysis tools.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Commercial_static_analysis_tools.png&amp;diff=156527"/>
				<updated>2013-08-08T08:10:45Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Legend_free_static_analysis_tools.png&amp;diff=156526</id>
		<title>File:Legend free static analysis tools.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Legend_free_static_analysis_tools.png&amp;diff=156526"/>
				<updated>2013-08-08T08:10:20Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Free_static_analysis_tools.png&amp;diff=156525</id>
		<title>File:Free static analysis tools.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Free_static_analysis_tools.png&amp;diff=156525"/>
				<updated>2013-08-08T08:09:57Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: MGHAZLI Zyad uploaded a new version of &amp;amp;quot;File:Free static analysis tools.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Free_static_analysis_tools.png&amp;diff=156524</id>
		<title>File:Free static analysis tools.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Free_static_analysis_tools.png&amp;diff=156524"/>
				<updated>2013-08-08T08:08:33Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=156523</id>
		<title>CRV2 ManualReviewProsCons</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=156523"/>
				<updated>2013-08-08T08:03:04Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Manual Review - Pros and Cons =&lt;br /&gt;
&lt;br /&gt;
Add content here ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Choosing a static analysis tool ==&lt;br /&gt;
&lt;br /&gt;
Choosing a static analysis tool is a difficult task since there are a lot of choices. The comparison charts below should help you decide which tool is right for you. This list is not exhaustive.&lt;br /&gt;
The first thing to do is to look to for a tool that supports the programming language of your choice. You also have to decide whether you want a commercial tool or a free one. Usually the commercial tools have more features and are more reliable than the free ones. The major commercial tools are equally effective but their usability might differ. Next, there is the type of analysis you are looking for: Security or Quality, Static or Dynamic analysis. You should also check the compatibility of the tool with your programming environment.&lt;br /&gt;
This was the easy part to narrow the choice down to a few tools. The next step requires you to do some work since it is quite subjective. The best thing to do is to test a few tools to see if you are satisfied with different aspects such as the user experience, the reporting of vulnerabilities, the level of false positives, the customization, the customer support… The choice should not be based on the number of features, but on the features that you need and how they could be integrated in your SDLC. Also, before choosing the tool, the security expertise of the targeted users should be clearly evaluated in order to choose an appropriate tool.&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_WhatIsCodeReview&amp;diff=156522</id>
		<title>CRV2 WhatIsCodeReview</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_WhatIsCodeReview&amp;diff=156522"/>
				<updated>2013-08-08T08:02:02Z</updated>
		
		<summary type="html">&lt;p&gt;MGHAZLI Zyad: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;What is Security Source Code Review?&lt;br /&gt;
&lt;br /&gt;
Source code review is the practice of reviewing developed code for vulnerabilities. There are many ways to review the security of an application and it is recommended to perform more than one method to help ensure more assessment coverage. Penetration testing is great at finding certain bugs such as technical signature or API based issues. Issues related to privacy, information leakage, denial of service are more suited to code review. Source code review is also good practice as you are finding issues early in the SDLC. Locating and fixing issues early in your SDLC makes it cheaper in terms of effort and cost to remediate. It also empowers developers to understand security bugs at the source code level such that they may not repeat the same mistakes.&lt;br /&gt;
&lt;br /&gt;
What is static analysis?&lt;br /&gt;
&lt;br /&gt;
Static Code Analysis is usually performed as part of a Source code review and is carried out at the Implementation phase of SDLC.  Static Code Analysis commonly refers to the running of static code analysis tools that attempts to highlight possible vulnerabilities whiting the ‘static’ (non-running) source code by using techniques such as Taint Analysis, Data Flow Analysis, Control Flow Graph, and Lexical Analysis. When the analysis is performed on a runtime environment, it is referred to as Dynamic Code Analysis.&lt;br /&gt;
Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;/div&gt;</summary>
		<author><name>MGHAZLI Zyad</name></author>	</entry>

	</feed>