Backlash Logo

Backlash

0
Commercial
Visit Website

Backslash Security is an application security platform that utilizes reachability analysis to enhance traditional Static Application Security Testing (SAST) and Software Composition Analysis (SCA) capabilities. The tool aims to reduce false positives and prioritize vulnerabilities by analyzing code reachability and data flow context. It offers features such as phantom package detection, fix simulation, and AI-powered remediation advice. Backslash integrates with CI/CD pipelines and provides automated security checks for pull requests. The platform also includes functionality for generating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) reports. Additional features include secret detection in code, open-source license policy enforcement, and malicious package identification. The tool is designed to provide visibility into application risks and help development teams focus on addressing the most critical security issues.

FEATURES

ALTERNATIVES

Dynamic Java code instrumentation kit for Android applications.

A Dynamic Application Security Testing (DAST) platform that provides automated security testing for web applications, APIs, and LLM-powered applications throughout the software development lifecycle.

DOMPurify is a fast XSS sanitizer for HTML, MathML, and SVG.

Protect your Fastify server against CSRF attacks with a series of utilities and recommendations for secure application development.

A security analysis platform that combines SAST, SCA, SBOM generation and AI-assisted remediation to detect and fix vulnerabilities during the software development lifecycle.

A brute-force protection middleware for express routes that rate-limits incoming requests.

A centralized application security posture management platform that integrates security tools, automates workflows, and provides visibility into application security risks.

Black Duck is an application security platform that provides software composition analysis and supply chain security capabilities to identify vulnerabilities, ensure license compliance, and manage SBOMs throughout the software development lifecycle.