Source Code Analysis Tools
Source code analysis tools, also referred to as Static Application Security Testing (SAST) Tools, are designed to analyze source code or compiled versions of code to help find security flaws.
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development life cycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful, especially when compared to finding vulnerabilities much later in the development cycle.
Strengths and Weaknesses
- Scales well – can be run on lots of software, and can be run repeatedly (as with nightly builds or continuous integration).
- Useful for things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, and so forth.
- Output is good for developers – highlights the precise source files, line numbers, and even subsections of lines that are affected.
- Many types of security vulnerabilities are difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. However, tools of this type are getting better.
- High numbers of false positives.
- Frequently can’t find configuration issues, since they are not represented in the code.
- Difficult to ‘prove’ that an identified security issue is an actual vulnerability.
- Many of these tools have difficulty analyzing code that can’t be compiled. Analysts frequently can’t compile code because they don’t have the right libraries, all the compilation instructions, all the code, etc.
Important Selection Criteria
- Requirement: Must support your programming language, but not usually a key factor once it does.
- Types of vulnerabilities it can detect (out of the OWASP Top Ten (plus more?))
- How accurate is it? False Positive/False Negative rates? - Does the tool have an OWASP Benchmark score?
- Does it understand the libraries/frameworks you use?
- Does it require a fully buildable set of source?
- Can it run against binaries instead of source?
- Can it be integrated into the developer’s IDE?
- How hard is it to setup/use?
- Can it be run continuously and automatically?
- License cost for the tool. (Some are sold per user, per organization, per application, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)
The tools listed in the tables below are presented in alphabetical order. OWASP does not endorse any of the vendors or tools by listing them in the table below. We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think that this information is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.
|.NET Security Guard||Open Source or Free||.NET, C\#, VB.net|
|42Crunch||Commercial||REST API security platform that includes Security Audit (SAST), dynamic conformance scan, runtime protection, and monitoring.|
|APIsecurity.io Security Audit||Open Source or Free||online tool for OpenAPI / Swagger file static security analysis|
|AppScan Source||HCL Software||Commercial||Static application security testing solution that helps identify vulnerabilities early in the development lifecycle, understand their origin and potential impact and remediate the problem.|
|AppScan on Cloud||HCL Software||Commercial||Cloud-based application security testing suite to perform SAST, DAST, IAST & SCA on web and mobile application.|
|Bandit||Open Source or Free||Bandit is a comprehensive source vulnerability scanner for Python|
|Beyond Security beSOURCE||Beyond Security||Commercial||Static application security testing (SAST) used to be divorced from Code quality reviews, resulting in limited impact and value. beSOURCE addresses the code security quality of applications and thus integrates SecOps into DevOps.|
|Brakeman||Open Source or Free||Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications|
|CAST AIP||Commercial||Performs static and architectural analysis to identify numerous types of security issues. Supports over 30 languages. [AIP's security specific coverage is here](https://www.castsoftware.com/solutions/application-security/cwe#SupportedSecurityStandards).|
|CodeScan Cloud||Commercial||A Salesforce focused, SaaS code quality tool leveraging SonarQube's OWASP security hotspots to give security visibility on Apex, Visualforce, and Lightning proprietary languages.|
|CodeSonar||Commercial||tool that supports C, C++, Java and C\# and maps against the OWASP top 10 vulnerabilities.|
|CodeSonar||Open Source or Free||C, C++, Java|
|Contrast Assess||Commercial||Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code & data analysis. It provides code level results without actually relying on static analysis.|
|Coverity Static Analysis||Synopsys||Commercial|
|Dawnscanner||Open Source or Free||Dawnscanner is an open source security source code analyzer for Ruby, supporting major MVC frameworks like Ruby on Rails, Padrino, and Sinatra. It also works on non-web applications written in Ruby.|
|Deep Dive||Open Source or Free||Byte code analysis tool for discovering vulnerabilities in Java deployments (EAR, WAR, JAR).|
|DerScanner||DerScanner Ltd.||Commercial||Capable of identifying vulnerabilities and backdoors (undocumented features) in over 30 programming languages by analyzing source code or executables, without requiring debug info.|
|DevBug||Open Source or Free||Web Based||PHP|
|ECG||VoidSec||Commercial||SaaS TCL Static Source Code Analysis Tool able to detect real and complex security vulnerabilities in TCL/ADP source-code. Discovered vulnerabilities will be mapped against the OWASP top 10 vulnerabilities.|
|Find Security Bugs||Open Source or Free||Java, Scala, Groovy|
|FindBugs||Open Source or Free||Find bugs (including a few security flaws) in Java programs [Legacy - NOT Maintained - Use SpotBugs (see other entry) instead]|
|FindSecBugs||Open Source or Free||A security specific plugin for SpotBugs that significantly improves SpotBugs's ability to find security vulnerabilities in Java programs. Works with the old FindBugs too.|
|Flawfinder||Open Source or Free||Scans C and C++.|
|GolangCI-Lint||Open Source or Free||A Go Linters aggregator - One of the Linters is [gosec (Go Security)](https://github.com/securego/gosec), which is off by default but can easily be enabled.|
|Google CodeSearchDiggity||Open Source or Free||Uses Google Code Search to identify vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more. *Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.*|
|Graudit||Open Source or Free||Scans multiple languages for various security flaws. Basically security enhanced code Grep.|
|HCL AppScan CodeSweep||Open Source or Free||This is the first Community edition version of AppScan. It is delivered as a VS Code plugin and scans files upon saving them. The results show the location of a finding, type and remediation advice. The tool currently supports Python, Ruby, JS (Node, Angular, JQuery, etc) , PHP, Perl, COBOL, APEX & a few more.|
|Hdiv Detection||Hdiv Security||Commercial||Hdiv performs code security without actually doing static analysis. Hdiv does Interactive Application Security Testing (IAST), correlating runtime code & data analysis. It provides code-level results without actually relying on static analysis.|
|Julia||JuliaSoft||Commercial||SaaS Java static analysis|
|Kiuwan||a division of Idera, Inc.||Commercial||provides an application security testing and analytics platform – including SAST and SCA solutions – that reduces risk and improves change management and DevOps processes|
|Klocwork||Perforce||Commercial||Static Code Analysis for C, C++, C#, and Java|
|Klocwork||Open Source or Free||C, C++, C\#, Java|
|Microsoft FxCop||Open Source or Free||.NET|
|Microsoft PREFast||Open Source or Free||C, C++|
|MobSF||Open Source or Free||Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.|
|MobSF||Open Source or Free||Windows, Unix||Android Java, Objective C, Swift|
|OWASP Code Crawler||OWASP||Open Source||.NET, Java|
|OWASP LAPSE Project||OWASP||Open Source||Java|
|OWASP Orizon Project||OWASP||Open Source||Java|
|OWASP WAP (Web Application Protection)||OWASP||Open Source||PHP|
|Oversecured||Oversecured Inc||Commercial||Android||A static SaaS-based vulnerability scanner for Android apps (APK files), supports apps written on Java and Kotlin. Also allows integrations into DevOps processes.|
|PITSS.CON||PITTS||Commercial||Scans Oracle Forms and Reports Applications|
|PMD||Open Source or Free||PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues).|
|PVS-Studio||Open Source or Free||C, C++, C\#|
|PVS-Studio Analyzer||PVS-Studio||Commercial||Static code security analysis for C, C++, C#, and Java. A commercial B2B solution, but provides several free [licensing options](https://www.viva64.com/en/b/0614/).|
|ParaSoft||Open Source or Free||C, C++, Java, .NET|
|Parasoft Test||Parasoft||Commercial||Test tools for C/C++, .NET, Java|
|Polyspace Static Analysis||Open Source or Free||C, C++, Ada|
|PreFast||Microsoft||Open Source or Free||PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.|
|Progpilot||Open Source or Free||Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.|
|Puma Scan||Puma Security||Commercial||A .NET C\# static source code analyzer that runs as a Visual Studio IDE extension, Azure DevOps extension, and Command Line (CLI) executable.|
|Puma Scan Professional||Open Source or Free||.NET, C\#|
|Pyre||Open Source or Free||A performant type-checker for Python 3, that also has [limited security/data flow analysis](https://pyre-check.org/docs/pysa-basics.html) capabilities.|
|RIPS||Open Source or Free||A static source code analyzer for vulnerabilities in PHP web applications.|
|RIPS||Open Source or Free||Java, PHP|
|RIPS Code Analysis||RIPS Technologies - Acquired by SonarSource||Commercial||Static security analyzer for Java and PHP.|
|Security Code Scan||Open Source or Free||Static code analyzer for .NET. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.|
|Seeker||Synopsys||Commercial||Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code & data analysis with simulated attacks. It provides code level results without actually relying on static analysis.|
|Sentinel Source||Whitehat||Commercial||Static security analysis for 10+ languages.|
|ShiftLeft Scan||Open Source or Free||A free open-source DevSecOps platform for detecting security issues in source ode and dependencies. It supports a broad range of languages and CI/CD pipelines by bundling various open source scanners into the pipeline.|
|Sink Tank||Open Source or Free||Java byte code static code analyzer for performing source/sink (taint) analysis.|
|SonarQube||Open Source or Free||Scans source code for 15 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by [SonarLint](https://www.sonarlint.org/).|
|Splint||Open Source or Free||C|
|SpotBugs||Open Source or Free||Java. This is the active fork replacement for FindBugs, which is not maintained anymore. Very little security. FindSecBugs plugin provides security rules.|
|Thunderscan SAST||DefenseCode||Commercial||Static security analysis for 27+ languages.|
|VS Code OpenAPI (Swagger) Editor extension||Open Source or Free||Plugin to Microsoft Visual Studio Code that enables rich editing capabilities for REST API contracts and also includes linting and Security Audit (static security analysis).|
|Veracode Static Analysis||Veracode||Commercial|
|VisualCodeGrepper||Open Source or Free||Windows||C/C++, C\#, VB, PHP, Java, PL/SQL|
|VisualCodeGrepper (VCG)||Open Source or Free||Scans C/C++, C\#, VB, PHP, Java, PL/SQL, and COBOL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.|
|bugScout||Nalbatech, Formerly Buguroo||Commercial|
|nodejsscan||Open Source or Free||Unix||Node.js|
|phpcs-security-audit||Open Source or Free||A set of PHP_CodeSniffer rules to finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks. It currently has core PHP rules as well as Drupal 7 specific rules.|
|reshift||Commercial||A CI/CD static code security analysis tool for Java that uses machine learning to give a prediction on false positives.|
- NIST’s list of Source Code Security Analysis Tools.
- DAST Tools - Similar info on Dynamic Application Security Testing (DAST) Tools.
- Free for Open Source Application Security Tools - This page lists the Commercial Source Code Analysis Tools (SAST) we know of that are free for Open Source.