Secure Source Code Review

Many organizations use automated tools for code review; but it has been observed that this method has its own obvious limitations. Programmers often follow incorrect programming practices, which lead to security loopholes. To mitigate these risks, it is important to perform code review to capture security loopholes.   


  • Data validation 
  • Error Handling 
  • Authentication 
  • Authorization 
  • Session Management 
  • Logging 
  • Encryption   


  • OWASP 
  • SDLC 
  • NIST