Tool Capabilities
Designed to accelerate the adoption of continuous software assurance practices, the SWAMP facility fills an important niche, as software assurance best practices require the use of multiple testing tools to create a comprehensive view of an application’s weaknesses. According to a NIST research report, different tools find different weaknesses and over two-thirds of detected software defects were only able to be discovered by one tool. The report went on to explain that it was very rare that the same code defect was able to be detected by three or more tools (Report on the Static Analysis Tool Exposition (SATE) IV, January 2013). Additionally, the National Security Agency Center for Assured Software published a separate study of over 60,000 test cases with several million lines of source code (6.5 million+ for C/C++ and 3.2 million for Java) which showed that only 14 percent of the known software defects were able to be detected, even when using multiple tools. To address this deficiency, the SWAMP offers a large collection of both commercial and open-source testing tools to support better software assurance practices and identify a larger array of weaknesses.
List of Tools Available in the SWAMP
Open-Source Tools
After studying data from a wide variety of sources, collecting input from practitioners in the field, and building on the experiences of the SWAMP team members, a collection of open-source static analysis tools is available in the SWAMP today. The SWAMP chooses to integrate tools based on the following:
- They support languages currently available or being integrated into the SWAMP.
- They cover important classes of CWEs such as injections, buffer handling, information leaks, numeric handling, and web deceptions.
- They are at the top of their class for tools of their type.
- Development of the tool does not appear to have stagnated or to have been abandoned.
- They are functionally representative of other tools for the same languages.
If you are an open-source tool developer interested in adding a tool to the SWAMP, please send a request to support@continuousassurance.org with a brief description of your tool and your contact information.
Commercial Tools
Commercial tool vendors are committed to improving software assurance as a whole, and as a result, have offered the use of their tools in the SWAMP. This in turn will help advance the state of cybersecurity and improve the resilience of the open-source software relied upon throughout the software community. The following tool vendors have partnered with the SWAMP.
|
![]() ![]() |
If you are a commercial tool developer interested in adding a tool to the SWAMP, please send a request to support@continuousassurance.org with a brief description of your tool and your contact information.
Results Viewers
Code Dx
Since it is necessary to use multiple tools to create a truly comprehensive view of a software application’s weaknesses, Code Dx™, an integrated results viewer, provides a critical piece that has been missing in the software assurance process. Until now, there has been no way to automate the aggregation of testing results into a single platform, because there are no standardized naming conventions or severity ratings used across different tools, nor is there a standard format for displaying tool results. Code Dx™ is a software assurance analytics tool that consolidates, normalizes, prioritizes, and displays all of the weaknesses detected by these disparate tools into a centralized viewer.
Code Dx™ enables SWAMP users to visualize and correlate the security weaknesses in their software. In addition, Code Dx™ improves coding processes by tracing weakness to specific areas or lines of code while also providing trend analysis. Developers can achieve an acceptable level of software assurance using a learn-one/use-many tool, while injecting security best practices into the software development life cycle (SDLC).
Native Viewer
Developed by the SWAMP, the Native viewer provides a basic, HTML-based summary of the results from a single assessment tool.