Doing security the right way demands an army – of developers, security teams, and the tools that each uses to help create and maintain secure code. With the increasingly important mindset of creating quality, secure code from the start, we’ve seen a greater shift towards the adoption of tools designed to detect flaws as quickly as possible in the software development lifecycle (SDLC).
One of those tools is static code analysis. The true strength of static source code analysis (SCA) is in quickly and automatically checking everything “under the hood” without actually executing the code. Because it works to discover issues that can be hard to discover manually, it’s a perfect companion to the human eye. Even the most senior security people still miss security flaws. After all – we are still human, so the combination of machine and man make for better coverage.
It takes a strong source code analysis tool (and probably several for full coverage, especially if we’re talking open source) to help get the job of securing an application done. While we would normally have a perfect product for these sorts of issues (hint, hint), commercial tools just aren’t for everyone, for any number of reasons. Whether you’re a developer or part of a security team, there is an array of open source static source code analysis options out there, but only a few are really good.
To help those searching for an open source static source code analysis tool (quite a mouthful!), we’ve compiled a list of the best tools for different languages.
The 9 Most Popular Open Source Static Source Code Analysis Tools for Developers & Security Teams:
1. Multiple Languages
This automated code security tool works with C++, C#, VB, PHP and Java to identify insecurities and other issues in the code. Developed by Nick Dunn (@N1ckDunn), the tool quickly scans and describes – in detail – the issues it finds, offering an easy-to-use interface.
- Allows for custom configurations for your own queries
- Tells you the security level of the vulnerabilities it finds
- Searches intelligently for specific violations of OWASP recommendations
- Consistently updated since its creation in 2012
- While it can analyze many languages, you have to tell it the language you’re scanning
- Scans for a set list of vulnerabilities that cannot be modified
- Isn’t fully automated
For more info on Yasca, check out this presentation that the creator, Michael Scovetta gave at the NY PHP Conference in ’09. The latest version, 3.0.4, was released in 2012. See the GitHub repository here.
- The fact that YASCA is an aggregated tool from other powerful tools, it took the best parts of each and combined for broader coverage
- Broader does not mean deeper: Keep in mind that this tool was built to look for low-hanging fruits like SQL injections and XSS, so be wary of missing more serious issues.
The tool, which names stands for Lightweight Analysis for Program Security in Eclipse, is an OWASP security scanner, developed as an Eclipse plugin, which detects vulnerabilities in Java EE Applications. LAPSE+ is liscenced under the GNU General Public License v.3 and was originally developed by Stanford University.
- Tests validation logic without compiling your code
- Offers results as three steps: Vulnerability Source, Vulnerability Sink and Provenance Tracker
- Doesn’t identify compilation errors
- Limited to Eclipse IDE’s only
- Project was taken over in early 2014 but no new version since 2012
This tool, developed by Johannes Dahse, tokenizes and parses source code to detect sinks and other vulnerabilities including SQLi, XSS, RCE and more. Check out Johannes’ presentation on the tool for further info.
- Fast results with range of security controls
- Nice reporting with visualizations makes fixing vulnerabilities faster
- Can be limited with regards to data flow
- As of this year RIPS 0.5 development has been abandoned with a re-write of the tool on deck but still unavailable
- Easy to use with instant results
- Nice use of OWASP wiki page links for more info on any found vulnerability
- Simplistic and is only meant for light analysis
Designed to be simple and easy to use, FlawFinder reports well-known security issues in applications written in C, sorted by risk level. Developed by open-source and secure software expert David Wheeler, the tool itself is written in Python and uses a command line interface. FlawFinder is officially CWE compatible.
- Ability to check only the changes made to code for faster, more accurate results
- Long history, released in 2001 with consistent updates
- A number of false positives
- Requires Python 1.5
This tool, available under a GNU General Public License, was developed to check non-standard code that compilers would normally not detect. Created by Daniel Marjamäki, CPPCheck offers a command line mode as well as a GUI mode and has a number of possibilities for environment integration.
- Plugins and integrations for a number of IDEs: Eclipse, Hudson, Jenkins, Visual Studio.
- Daniel’s plan is to release a new version every other month or so, and he’s been keeping up with that goal.
- Available in many world languages, including English, Dutch, Finnish, Swedish, German, Russian, Serbian and Japanese.
- Doesn’t detect a large number of bugs (as with most of the other tools)
- Customization requires good deal of effort
- Results take longer than other tools
5. Ruby on Rails
This tool, developed in 2010 by Justin Collins (@presidentbeef) is specifically for finding vulnerabilities and security issues in Ruby on Rails apps at any development stage.
Brakeman is used by the likes of Twitter (where Justin is employed), GitHub, and Groupon to look for vulnerabilities. Justin gave a talk at RailsConf 2012 that’s worth watching describing the value of using SCA early on and how Brakeman accomplishes that.
- Easy setup and configuration and fast scans.
- Because it’s specifically built for Ruby on Rails apps, it does a great job at checking configuration settings for best practices.
- With the ability to check only certain subsets, each code analysis is able to be customizable to specific issues.
- The developer has been maintaining and updating the tool on a regular basis since its first release.
- Because of its suspicious nature, the tool can show a high rate of false positives
- As written on the tool’s FAQ page, just because a report shows zero warnings doesn’t mean your application is flaw-free; “There may be vulnerabilities Brakeman does not test for or did not discover. No security tool has 100% coverage.”
What are your favorite Open-Source Static Code Analysis tools? Did we miss any? Feel free to comment on our Facebook fanpage or directly to firstname.lastname@example.org
Author: Sarah Vonnegut