Jump to content

Code audit

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 41.239.2.140 (talk) at 23:30, 7 May 2011 (Guidelines). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions. It is an integral part of the defensive programming paradigm, which attempts to reduce errors before the software is released. C and C++ source code is the most common code to be audited since many higher-level languages, such as Python, have fewer potentially vulnerable functions (e.g., functions that do not check bounds).

Guidelines

High-risk vulnerabilities

Low-risk vulnerabilities

Tools

Source code auditing tools generally look for common vulnerabilities and only work for specific programming languages. Such automated tools could be used to save time, but should not be relied on for an in-depth audit. Applying such tools as part of a policy-based approach is recommended.[1]

See also

References

  1. ^ "Static analysis at the end of the SDLC doesn't work" by Wayne Ariola, SearchSoftwareQuality.com, September 22, 2008