Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle. Task: Source Code Analysis
Browse 31 security tools
AI platform for automated code review, security risk detection across the SDLC.
AI-powered AppSec platform for code, supply chain, secrets & DAST.
Automated C code analysis and repair tool benchmarked against NIST SAMATE.
Developer-first SAST tool for finding security & privacy vulns in code.
Detects exposed API keys and credentials across multiple cloud services
Source code verification tool that finds bugs and security vulnerabilities
Source code malware scanner detecting backdoors and malicious code in repos
Scans source code repositories for exposed secrets and sensitive data
API discovery tool that maps application attack surface from source code
SAST tool for finding code quality & security defects in large-scale software
SAST tool that identifies vulnerabilities in source code across 30+ languages
Identifies cryptographic algorithms and libraries in code for compliance
Detects and prevents source code leakage and suspicious behavior.
SAST scanner for identifying security vulnerabilities in source code
SAST tool for continuous source code vulnerability scanning and remediation
SAST tool using virtual compilers to analyze source code for vulnerabilities
SAST tool for identifying security vulnerabilities in source code
SAST tool that identifies security and quality issues in source code
SAST engine that scans code commits for security vulnerabilities
SAST solution that scans 30+ languages to find and fix code vulnerabilities
Code quality and security platform with SAST, SCA, and AI-powered remediation
A secret scanning tool that examines NPM modules and ZIP files for exposed credentials and sensitive information using nuclei templates.
AI-powered SAST tool that finds and auto-fixes code vulnerabilities in real-time
A pre-commit security tool that scans source code repositories to detect and prevent secrets like API keys, passwords, and credentials from being committed to version control systems.