Frequently Asked Questions

Q: What is the SWAMP?

A: The Software Assurance Marketplace (SWAMP) is an open facility that is designed, built, and operated by four research institutions. The SWAMP provides no-cost access to an array of open-source and commercial software analysis tools. The SWAMP also includes a (growing) library of open-source applications with known vulnerabilities to help tool developers improve the effectiveness of their static and dynamic analysis tools. One of the main goals of the SWAMP is to provide an open marketplace of software packages and analysis tools, with the ability to control how packages, tools, and expertise are shared with the entire software community. With the computing capacity required to support continuous assurance, the SWAMP provides the automation to continuously run multiple analysis tools against software packages. Results are viewable in an integrated results viewer that offers the developer the capability to view weakness reports with integrated CWE (common weakness enumeration) data from multiple tools.

All SWAMP activities performed by users are confidential. Users have the option to share software packages and assessment results with other SWAMP users and can choose to form groups through a project.

The ultimate goal of the SWAMP is to promote continuous assurance technologies and practices through an open and collaborative framework that protects confidential data and facilitates sharing, thus, making it easier for software developers to adopt continuous assurance practices.

Q: Who owns the SWAMP?

A: The SWAMP (Software Assurance Marketplace) is hosted at the Morgridge Institute for Research, a private, not-for-profit research institute located on the University of Wisconsin-Madison campus. Collaborating partners include, University of Wisconsin-Madison’s Middleware Security and Testing Team, University of Illinois at Urbana-Champaign’s National Center for Supercomputing Applications (NCSA), and Indiana University’s Center for Applied Cybersecurity Research (CACR). Morgridge Institute for Research (MIR) owns all data in the SWAMP. MIR is committed to keeping the confidentiality of all SWAMP data. The SWAMP is funded by the U.S. Department of Homeland Security Science & Technology Directorate (DHS-S&T) to advance our nation’s cybersecurity, protect our critical infrastructure, and improve the reliability of the open-source software used extensively throughout the software community. DHS-S&T has explicitly disowned any rights to access or own data in the SWAMP (SWAMP Privacy Policy).

Q: What is SWAMP-in-a-Box (SiB)?

A: The Software Assurance Marketplace (SWAMP) provides continuous software assurance capabilities to developers and researchers. For users that need or prefer to run software assurance tools on their own computing infrastructure, the SWAMP offers a standalone software application called “SWAMP-in-a-Box” (SiB). The SiB package can be deployed on your own servers if you have higher security or compliance requirements for your software, or, being open-source, when you want to customize the software. SWAMP-in-a-Box is available as an open beta, downloadable from GitHub. More information can be found at

Q: How does SWAMP fit into my current development process?

A: The SWAMP offers several plug-ins for Eclipse, Git and Subversion, and Jenkins to integrate into your software development lifecycle and to support continuous integration. These plug-ins allow assessments with any of the tools supported by the SWAMP. Results can be viewed directly in the SWAMP, or for Eclipse and Jenkins, directly within the product. Each plug-in requires a valid SWAMP account. More information can be found at

Q: What kind of static analysis code tools can be used in the SWAMP?

A: Currently, the SWAMP offers the following open-source and commercial static analysis tools: List of Tools Available in the SWAMP. Recently, several commercial vendors partnered with the SWAMP. Static analysis tools from Parasoft, GrammaTech, and Synopsys are now available in the SWAMP. The SWAMP will be integrating tools from Sonatype and PRQA during 2018. We will continue to add more tools from open-source and commercial vendors throughout the life of the project, including introducing dynamic analysis capabilities.

The SWAMP welcomes input from users on software analysis tools they would like to see in the SWAMP. User input, comments, or suggestions can be made at

Q: Can I bring my own tool into the SWAMP? 

A: If you would like to upload your own static or dynamic analysis tool into the SWAMP, please contact us at We are happy to work with you to integrate your tools.

Any tool uploaded to the SWAMP is assumed to be private unless you decide to release it to the public.

Note that before a tool can be integrated, the SWAMP must support the platform (OS) required for your analysis tool and the programming language that your tool can analyze. Both of these potential limiting factors can be addressed and resolved in a timely manner within reason.

Q: How do I access commercial tools in the SWAMP? 

A: If you would like access to a commercial tool supported in the SWAMP, you must first request permission. Follow the instructions below:

  1. Log in to your SWAMP account.
  2. Click on your SWAMP username in the top right corner of the page to go to your account.
  3. Select the Permissions tab.
  4. For each tool you would like access to use in the SWAMP, select the Request button on the right.
  5. Fill out and submit the form.
  6. A member of the SWAMP team will follow-up with the commercial tool vendor for authorization. The vendor may reach out to you with questions.
  7. Once authorization has been received from the tool vendor, your access will be granted to use the commercial tool in the SWAMP.

To add-on and access commercial tools with SWAMP-in-a-Box, review the SWAMP-in-a-Box Administrator Manual.

Q: Which programming languages and operating systems (OS) are supported? (What will be supported in the future?)

A: The SWAMP welcomes input from users on programming languages and platforms/operating systems (OS) they would like to see in the SWAMP. User input, comments, or suggestions can be made at

Currently, the SWAMP supports the following programming languages: C/C++, Java source, Java bytecode, Python, Ruby on Rails, Android Mobile Code, PHP, JavaScript, HTML, CSS, and XML. In 2018 and beyond, support will be added for Perl, C#, Objective C, and more.

Current platforms (OS) supported by SWAMP are: List of Platforms/Operating Systems Available in the SWAMP. During 2018 and beyond, support will be added for Mac OSX, .NET, and iOS mobile code platforms.

Q: Can anyone get an account?

A: Yes, anyone can gain access to the SWAMP at or download SWAMP-in-a-Box.

The SWAMP supports verification through GitHub accounts, Google accounts, university accounts affiliated with CI Logon, promotional codes, trusted users that can vouch for the individual, and SWAMP Administration that can confirm the potential user.

Q: Are the uploaded projects and tools available to the public, or do I have an option to set them private?

A: Any project, as in software package, uploaded to the SWAMP is assumed to be private unless explicitly shared with other SWAMP users. Users can control access to their software packages and to assessment results by controlling which Projects can access the software or the results. Project owners control membership in their projects.

To make a software package or tool public, a request is made to SWAMP Administration at The owner of the software package or tool can change sharing options for software packages or tools at any time.

Q: How does the SWAMP compare to other services like Fortify?

A: The SWAMP facility is unique in offering access to multiple tools, the automation and computing capacity needed to support continuous assurance, and an integrated viewer for assessment results from multiple tools. Unlike other similar offerings of no-cost software assessment services by commercial entities, the SWAMP is designed, built, and operated by a partnership of four not-for-profit research institutions that have a long, demonstrated commitment to open source, cybersecurity, and software assessment and are driven by an underpinning vision of an open software assurance framework that facilitates easy adoption of new software analysis technologies.

Q: What is software assurance and how does it relate to national security?

A: The U.S. Department of Homeland Security’s Build Security In program defines software assurance as a process that affirms software will function as intended, free from vulnerabilities intentionally or unintentionally inserted into the code. Software assurance also ensures that the processes and products used to produce and sustain software conform to relevant requirements and standards. Improved cybersecurity results from effective software assurance efforts.

Growing awareness of the critical role software plays in society has resulted in federal recognition of the need for greater access to tools that help ensure software quality and security. The SWAMP works to improve software reliability and security and enhance the tools available for software analysis.

Q: What is continuous software assurance?

A: Continuous software assurance is the automated, repeated assessment of software by software assurance tools. The goal is to ensure that applications are assessed for weaknesses any time that code changes are made, throughout the software development life cycle. This ensures that new weaknesses introduced as code is added or updated can be remediated during more cost-effective development and testing phases, not after software is released. “Do it early. Do it often.”

The SWAMP supports continuous software assurance by allowing users to schedule assessment runs on a recurring basis (for example, nightly). Software developers can schedule the latest version of their software package to be assessed by a pre-configured set of tools and/or platforms. Similarly, tool developers can schedule the latest version of their tool to assess a pre-configured set of packages and/or test suites. By comparing assessment results over time, developers can detect regressions or improvements between versions of their software.

Q: What is the difference between a weakness and a vulnerability?

A: A vulnerability is a weakness or defect in a software system that can be exploited by an attacker to make the software behave insecurely. Quality issues often arise from weaknesses that are not exploitable through incorrect functioning of the software.

Q: How does the Software Assurance Marketplace fit in with other cybersecurity initiatives?

A: Building on a host of federally funded initiatives, the Software Assurance Marketplace collaborates with and leverages the resources of the following organizations, projects and programs.

Q: How can I access the Software Assurance Marketplace?

A: Visit to join the SWAMP by creating an account or signing in through GitHub, Google, or a university account affiliated with CI Logon.

For information, contact Assistant Project Manager, Irene Landrum (, 608-316-4114) or send general questions to


Download FAQ PDF