Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Secure Programming Group at the University of Virginia's Department of Computer Science is responsible for the development and ongoing maintenance of Splint. David Evans leads the project and serves as its main developer. Memory bounds checking was created by David Larochelle. Significant contributions to Splint's development were also made by University of Virginia students, including Chris Barker, David Friedman, Mike Lanouette, and Hien Phan. Splint serves as the evolution of LCLint, a tool that originated from a collaborative research effort between the Massachusetts Institute of Technology and Digital Equipment Corporation's System Research Center. David Evans was also the chief designer and developer of LCLint. The initial concept for a static checking tool aimed at identifying discrepancies between LCL specifications and their C implementations came from John Guttag and Jim Horning. Their insights into the design and functionality proved invaluable, playing a crucial role in shaping both LCLint and its successor, Splint. Together, the team has fostered a robust environment for developing tools that enhance software reliability and security.
Description
The YAG Suite is a French-made innovative tool that takes SAST to the next level. YAGAAN is a combination of static analysis and machine-learning. It offers customers more than a sourcecode scanner. It also offers a smart suite to support application security audits and security and privacy through DevSecOps design processes. The YAG-Suite supports developers in understanding the vulnerability causes and consequences. It goes beyond traditional vulnerability detection. Its contextual remediation helps them to quickly fix the problem and improve their secure coding skills. YAG-Suite's unique 'code mining' allows for security investigations of unknown applications. It maps all relevant security mechanisms and provides querying capabilities to search out 0-days and other non-automatically detectable risks. PHP, Java and Python are currently supported. Next languages in roadmap are JS, C and C++.
API Access
Has API
API Access
Has API
Screenshots View All
No images available
Integrations
C
C++
Eclipse IDE
GitHub
GitLab
Jenkins
MATLAB
Python
Visual Studio Code
Integrations
C
C++
Eclipse IDE
GitHub
GitLab
Jenkins
MATLAB
Python
Visual Studio Code
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
From €500/token or €150/mo
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
University of Virginia
Founded
2007
Country
United States
Website
splint.org
Vendor Details
Company Name
YAGAAN
Founded
2017
Country
France
Website
yagaan.com
Product Features
Static Application Security Testing (SAST)
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Product Features
Static Application Security Testing (SAST)
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection