Splint

Splint

University of Virginia
+
+

Related Products

  • Aikido Security
    127 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • TrustInSoft Analyzer
    6 Ratings
    Visit Website
  • Parasoft
    137 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Astra Pentest
    222 Ratings
    Visit Website
  • Canditech
    106 Ratings
    Visit Website
  • qTest
    Visit Website
  • MuukTest
    33 Ratings
    Visit Website

About

OpenText Static Application Security Testing (SAST) identifies and remediates security vulnerabilities in source code early in the software development lifecycle. It supports extensive language coverage and integrates seamlessly with popular CI/CD tools such as Jenkins, Azure DevOps, Jira, and Visual Studio. The platform uses advanced static code analysis and AI-driven insights to prioritize risks and reduce false positives, enabling developers to focus on fixing critical vulnerabilities efficiently. With its customizable code analysis and rule sets, it helps reduce development time by catching issues early. OpenText SAST complies with industry standards like OWASP and offers flexible deployment options including SaaS, private cloud, and on-premises. This comprehensive approach enhances application security without sacrificing development speed or accuracy.

About

Splint is developed and maintained by the Secure Programming Group at the University of Virginia Department of Computer Science. David Evans is the project leader and the primary developer of Splint. David Larochelle developed the memory bounds checking. University of Virginia students Chris Barker, David Friedman, Mike Lanouette and Hien Phan all contributed significantly to the development of Splint. Splint is the successor to LCLint, a tool originally developed as a joint research project between the Massachusetts Institute of Technology and Digital Equipment Corporation's System Research Center. David Evans was the primary designed and developer of LCLint. John Guttag and Jim Horning had the original idea for a static checking tool for detecting inconsistencies between LCL specifications and their C implementations. They provided valuable advice on its functionality and design and were instrumental in its development.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Development and security teams seeking a comprehensive, AI-enhanced static application security testing solution integrated into CI/CD pipelines to identify and remediate vulnerabilities early

Audience

Development teams interested in a Static Application Security Testing (SAST)

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

No images available

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

OpenText
Founded: 1991
Canada
www.opentext.com/products/static-application-security-testing

Company Information

University of Virginia
Founded: 2007
United States
splint.org

Alternatives

Alternatives

david3

david3

Tobit Software
MB&G MobileMap

MB&G MobileMap

Mason Bruce & Girard
SonarQube Cloud

SonarQube Cloud

SonarSource
david.net

david.net

2R Software GmbH
PT Application Inspector

PT Application Inspector

Positive Technologies
Oscar

Oscar

Oscar McMaster

Categories

Categories

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Integrations

Azure DevOps Server
Bamboo
Black Duck
C
CrowdStrike Container Security
Gradle
Harness
HivePro Uni5
Jira
MATLAB
Maverix
Mend.io
Microsoft 365
OpenText Software Delivery Management
SQUAD1
Slack
Snowflake
Snyk
ThreadFix
Visual Studio

Integrations

Azure DevOps Server
Bamboo
Black Duck
C
CrowdStrike Container Security
Gradle
Harness
HivePro Uni5
Jira
MATLAB
Maverix
Mend.io
Microsoft 365
OpenText Software Delivery Management
SQUAD1
Slack
Snowflake
Snyk
ThreadFix
Visual Studio
Claim OpenText Static Application Security Testing and update features and information
Claim OpenText Static Application Security Testing and update features and information
Claim Splint and update features and information
Claim Splint and update features and information