Summary
In this chapter, we introduced how to build your own secure code inspection system with the SWAMP. The SWAMP allows developers to submit their source code or package for automatic secure code review, helping them to identify critical security issues at the source-code level. The SWAMP provides cloud and on-premises versions. We demonstrated the steps for submitting a vulnerable Python project for a security review on SWAMP.
As we continue to look at secure code review, there are key security issues that we will focus on, such as weak encryption algorithms, insecure protocol, hardcoded sensitive information, and risky APIs that may result in command injection or buffer overflow. The list of risky APIs can be a reference to use when ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access