Comdate is a leading supplier of solutions to the Telecommunications and Information Technology industries.

Synopsys Coverity Code Advisor

Synopsys Coverity Code Advisor

 

The Coverity® Code Advisor solution includes Coverity Quality Advisor and Coverity Security Advisor. The solution surfaces quality and security defects in the developer workflow, with accurate and actionable remediation guidance, based on patented techniques and a decade of research and development and analysis of over 10 billion lines of proprietary and open source code.

Arm your developers with the information they need to troubleshoot and fix critical defects quickly and efficiently.
Build quality and security into development to reduce the cost of rework and delayed time to market resulting from defects found late in the cycle.
Reduce the risk of costly and brand-damaging software failures and security breaches in the field or in production.

The Coverity Code Advisor solution helps reduce risk and lower overall project cost by identifying critical quality defects and potential security vulnerabilities during development. The solution utilizes sophisticated source code analysis to find the most critical defects in highly complex code bases, leveraging patented techniques for deep analysis and accurate issue detection.

The Coverity Code Advisor solution finds critical issues such as:

  • API usage errors
  • Best practice coding errors
  • Build system issues
  • Buffer overflows
  • Class hierarchy inconsistencies
  • Code maintainability issues
  • Concurrent data access violations
  • Control flow issues
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Deadlocks
  • Error handling issues
  • Hard-coded credentials
  • Incorrect expression
  • Insecure data handling
  • Integer handling issues
  • Integer overflow
  • Memory – corruptions
  • Memory – illegal accesses
  • Null pointer dereferences
  • Path manipulation
  • Performance inefficiencies
  • Program hangs
  • Race conditions
  • Resource leaks
  • Rule violations
  • Security best practices violations
  • Security misconfigurations
  • SQL Injection
  • Uninitialized members

Download Datasheet

 Case Studies and Testamonials  

NASA Testamonial 

CrowdStrike Testamonial 

Alcatel-Lucent Case Study 

Download case study

Click HERE to contact us for more information