Code analyzer Solar appScreener 3.9 now supports Dart and CSV format
Solar Security has unveiled a new release of its code analyzer – Solar appScreener 3.9, which now also supports Dart and thus retains leadership in the number of programming languages covered.
Handling code scan details has become easier as users can export reports in CSV format. The new version also provides an option to manually select files for analysis and thus avoid scanning the code of the entire project when you only need to analyze a specific part.
Solar appScreener 3.9 supports 36 programming languages – a record for code analyzers, including newly added object-oriented language Dart, developed by Google in 2011 as an alternative to JavaScript and designed to create mobile, server, and web apps.
Moreover, Solar Security specialists made improvements for already supported languages by adding the analysis of Vue.js framework for JavaScript and Flask framework for Python.
“In line with current development trends, we are adding new hip and happening languages to our pool. That is why our new Solar appScreener supports Dart and is now the only tool capable of analyzing the code written in Dart for vulnerabilities,” said Daniil Chernov, Director of Software Security Solutions Center at Solar Security.
The developers also introduced some changes to reporting formats. Thus, Solar appScreener 3.9 is the first release with an option to export reports in CSV archive format, making data handling more flexible: users can now filter data by category and gain insights from graphs based on the obtained values.
Naturally, users can still receive reports in PDF as well, but this format is non-interactive and thus less convenient.
Solar appScreener 3.9 now allows users to select specific files for analysis. When sending an app for scanning, a user can see the files to be analyzed and manually remove some if needed.
If a user chooses to scan the entire project, the code analyzer will identify a set of files in the uploaded directory and then analyze each of them for vulnerabilities and backdoor. Once the scanning is complete, the results will be available in ‘Overview’ section of the interface or in the form of a separate report containing statistics on these files.
In the new version, you can run several scan jobs per project with different settings and according to the set order of priority, with all security analysis statuses being available in ‘Scans’ section.
Solar Security specialists also added an opportunity to delete project scans, so that users can either archive or permanently erase any scan.
Moreover, the new release offers an improved analysis launch procedure: the file selection field and the app link field are unified into one tab, and a new project scanning can be started in ‘Scans’ section.
Traditionally, developers expand the set of vulnerability search rules with each Solar appScreener release. This time, they added new search patterns and enriched vulnerability descriptions for supported programming languages.