OWASP- header image

OWASP Security Testing Tools

Scan your application for the current OWASP Top 10 Critical Application Security Risks.

Start for free and get results fast.

OWASP- header image

OWASP- Detect and eliminate vulnerabilities

Detect and Eliminate Vulnerabilities

Scan your code using a constantly-updated rule set (4K+) based on industry standards including OWASP Top 10, CWE/SANS-25, PCI-DSS, and more. Available for over 30 programming languages.

OWASP- Integrate with your IDE to code securely

Add Code Security To Your IDE Platform

Add Kiuwan Code Security to your IDE for instant analysis. Contextual feedback helps your developers learn to code more securely. Integrate with your CI toolchain to automate your DevSecOps.

OWASP- Reduce risk from open source components

Reduce Risk from Open Source Components

Automate discovery of open source components used by your application. Remediate exposure to risks from known vulnerabilties, obsolete versions, and licensing issues.

How do you test security with OWASP ZAP?

OWASP ZAP (Zed Attack Proxy) is a free, open-source tool for penetration testing. “Pen testing” involves simulating an attack on a running application in an attempt to uncover vulnerabilities. Whether done manually or with a tool, pen testing can significantly enhance your security strategy.

OWASP-How do you test security with OWASP ZAP?

There are drawbacks to relying only on pen testing. Pen testing is only as good as the pen tester and may miss vulnerabilities. In addition, pen testing requires a running application and therefore occurs relatively late in development. The cost to fix a vulnerability increases the later that it is found in the development lifecycle. In the case of pen testing, additional time is typically required to trace a security flaw back to the affected line of code.

Build security into your application from the start of the SDLC: combine Kiuwan Code Security and Kiuwan Insights for a comprehensive approach to remediating web application vulnerabilities.

A Dependency Check Examines Your Open-Source Libraries

A typical web application contains third-party code and open-source libraries that aren’t covered by SAST scanning. To identify risk from these components, you perform a dependency check using a Source Code Analysis (SCA) tool like Kiuwan Insights. With Kiuwan Insights, you can:


  • Automatically generate an inventory of the open-source components in use by your application.
  • Check open-source components for known vulnerabilities using the National Institute of Standards and Technology (NIST) vulnerability database.
  • Enforce your policies regarding open source components and ensure license compliance
  • Get automatic obsolescence notifications.
OWASP-A dependency check examines your open-source libraries

Kiuwan is a Leader in the OWASP Testing Tool Benchmark

OWASP-Test tool benchmark

We are up to the challenge. We have run Kiuwan on the OWASP Benchmark test cases and here you have the results. We have added them to the comparison graph published in the OWASP Benchmark website, which include open source and commercial tools. Kiuwan is right up there! Detecting almost 100% of true positives. But you don’t have to take our word for it: request a Kiuwan trial today.


What are the OWASP Top 10 Vulnerabilities?