SAST Scanning of Compiled and Built Artifacts (executables, etc)
We've heard from customers that they use other SAST tools to scan compiled and build code like executables. Other vendors call this binary analysis.
Binary analysis creates a behavioral model by analyzing an application’s control and data flow through executable machine code – the way an attacker sees it. Unlike source code tools, this approach accurately detects issues in the core application and extends coverage to vulnerabilities found in 3rd party libraries, pre-packaged components, and code introduced by compiler or platform specific interpretations.
Today our scanners support source code scanning, not built artifacts like executables.