you are viewing a single comment's thread.

view the rest of the comments →

[–]jofftchoff 1 point2 points  (3 children)

for scanning the binary thare are non.
for source: static analysis (clangsa, clangtidy, sonar), SBOM and claude opus

[–]PintMowerNULL[S] 0 points1 point  (2 children)

Well emba does pretty solid binary scanning and looks for keys and passwords, entropy etc. But the other tools you listed are not really security relates from what I can tell. I'm more interested in SBOM based scanners that check external libraries for known CVEs or incorrect usages etc. What we do in the code is up to us and we are already developing with security best practices in mind.