Verification of vulnerabilities in the code is carried out through a guided inspection of the source code. The source code is analyzed using a specific inspection process and appropriate analysis techniques and tools, in order to identify the vulnerability.
The inspection process requires a rigorous approach in detecting security vulnerabilities. At the end of the inspection, a compliance report is presented. It can meet the largest and most well-known market standards (OWASP, CWE, MISRA, NIST, PCI and CERT among others).