<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SAST on Yet another infosec blog</title><link>https://blog.rodolpheg.xyz/tags/sast/</link><description>Recent content in SAST on Yet another infosec blog</description><generator>Hugo</generator><language>fr-fr</language><managingEditor>contact@rodolpheg.xyz (0xRo)</managingEditor><webMaster>contact@rodolpheg.xyz (0xRo)</webMaster><lastBuildDate>Sat, 02 Aug 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.rodolpheg.xyz/tags/sast/index.xml" rel="self" type="application/rss+xml"/><item><title>Code auditing 101</title><link>https://blog.rodolpheg.xyz/posts/code-auditing--101/</link><pubDate>Sat, 02 Aug 2025 00:00:00 +0000</pubDate><author>contact@rodolpheg.xyz (0xRo)</author><guid>https://blog.rodolpheg.xyz/posts/code-auditing--101/</guid><description>&lt;h2 id="topics-covered">Topics covered&lt;/h2>
&lt;p>This post explores the evolution from manual code review to automated security testing, covering:&lt;/p>
&lt;ul>
&lt;li>The reality of manual code review and its limitations&lt;/li>
&lt;li>Understanding vulnerabilities vs weaknesses&lt;/li>
&lt;li>How SAST tools work under the hood&lt;/li>
&lt;li>Taint analysis and data flow tracking&lt;/li>
&lt;li>Sink-to-source vs source-to-sink methodologies&lt;/li>
&lt;li>Mitigation strategies: whitelisting vs blacklisting&lt;/li>
&lt;li>Dealing with false positives in practice&lt;/li>
&lt;li>Choosing and implementing SAST tools at scale&lt;/li>
&lt;li>The complementary relationship between manual and automated testing&lt;/li>
&lt;/ul>
&lt;p>It&amp;rsquo;s 3 AM. You&amp;rsquo;re on your fifth cup of coffee, eyes bloodshot, staring at line 2,847 of a 10,000-line pull request. Somewhere in this maze of curly braces and semicolons lurks a SQL injection vulnerability that could bring down your entire application. Welcome to the glamorous world of manual code review!&lt;/p></description></item></channel></rss>