AUDIT
CODE
The source code audit must make it possible to avoid information leaks and operating alterations. The following parts of source code will be particularly tested:
authentication, user management, resource access control, exchanges with the information system,
compliance with predefined security requirements,
as well as the most widespread vulnerabilities: CSS, SQL injections, CSRF...
1
Terms
For our code audits, we use the YAG suite solution from Y agaan , an innovative solution that combines machine learning and code analysis.
The code analysis takes place over 10 days. Our bias is to see what a CyberSecurity engineer can find in a week.
2
Prerequisites
For an effective code analysis, it is necessary to have defined a delimited and coherent target. If it is too broad, the result of the analysis may not be relevant.