Skip to content

Security

  • SQL Injection Attack: The web application allows access to the DB to foreign users
  • Microsoft Threat Model Tool

Quality Gate

  • Technical debt is the volume of bad code
  • Quality Gate comes to solve it

Inspect and validate code base

  • Inspect and validate code base for compliance (e.g., detect vulnerable dependencies)
  • Micro Focus Foritfy, Checkmarx CxSAST, BinSkim, OWASP Zed Attack Proxy Scan