{"id":11594,"date":"2023-05-02T17:11:21","date_gmt":"2023-05-02T17:11:21","guid":{"rendered":"https:\/\/bissoluciones.com\/blog\/?p=11594"},"modified":"2023-05-02T19:39:22","modified_gmt":"2023-05-02T19:39:22","slug":"security-scanner-una-herramienta-de-analisis-estatico","status":"publish","type":"post","link":"https:\/\/bissoluciones.com\/blog\/en\/security-scanner-una-herramienta-de-analisis-estatico\/","title":{"rendered":"Security Scanner: a static analysis tool"},"content":{"rendered":"<p>Security Scanner, la herramienta de an\u00e1lisis de c\u00f3digo est\u00e1tico que est\u00e1 incluida en el Entorno de Desarrollo Integrado (IDE por sus siglas en ingl\u00e9s) de GeneXus, con el objetivo de mejorar la seguridad de las aplicaciones desarrolladas con nuestra plataforma Low-Code.<\/p>\n\n\n\n<p>El an\u00e1lisis de c\u00f3digo est\u00e1tico son las inspecciones que se realizan en el c\u00f3digo fuente o en los binarios generados, para detectar errores y vulnerabilidades que puedan poner en peligro una aplicaci\u00f3n. Son est\u00e1ticas porque no ejecutan la aplicaci\u00f3n.<\/p>\n\n\n\n<p>Silvia Grampone, ingeniero de software, define las herramientas de an\u00e1lisis est\u00e1tico como una \u201ccaja blanca\u201d, ya que permiten que los analistas accedan a todo el c\u00f3digo.<\/p>\n\n\n\n<p>En el caso del Security Scanner, este revisa espec\u00edficamente el c\u00f3digo GeneXus, no el c\u00f3digo generado en c\u00f3digo nativo.<\/p>\n\n\n\n<p>\u201cEsta herramienta busca funciones que ya se saben a priori que pueden introducir vulnerabilidades en las aplicaciones si no son correctamente utilizadas por los desarrolladores. Al igual que cualquier herramienta de an\u00e1lisis est\u00e1tico, requiere un an\u00e1lisis a posteriori para eliminar los falsos positivos\u201d.<\/p>\n\n\n\n<p>Silvia, quien tambi\u00e9n se desempe\u00f1a como Analista de seguridad en GeneXus, explica que el Security Scanner se puede ejecutar de dos maneras: directamente en el IDE o por MSBuild, el cual se puede incluir en un pipeline de desarrollo.<\/p>\n\n\n\n<p><strong>Ejecuci\u00f3n desde el IDE<\/strong><\/p>\n\n\n\n<p>\u201cSe recomienda para los desarrolladores, por ejemplo, antes de hacer un commit a GeneXus Server para analizar el c\u00f3digo que acaban de desarrollar e ir paso a paso\u201d.<\/p>\n\n\n\n<p><strong>Ejecuci\u00f3n por MSBuild<\/strong><\/p>\n\n\n\n<p>Se recomienda para agregar en un pipeline de desarrollo para hacer un an\u00e1lisis posterior que se puede incluir para ejecutar mediciones o para hacer verificaciones\u201d.<\/p>\n\n\n\n<p>La documentaci\u00f3n de las reglas y de la tarea de MSBuild est\u00e1n en el wiki y es muy f\u00e1cil de utilizar. Para que el desarrollador pueda ejecutar el Security Scanner desde el IDE solo deben seguir la siguiente ruta:<\/p>\n\n\n\n<p><strong>Tools &gt; Security &gt; Security Scanner.<\/strong><\/p>\n\n\n\n<p>La tarea de MSBuild es f\u00e1cil de utilizar, simplemente debe copiarse como est\u00e1 en el wiki. Descubre m\u00e1s sobre este tema, en la charla DevSecOps: Redefiniendo las bases de la seguridad con el An\u00e1lisis Est\u00e1tico del C\u00f3digo, impartida por Silvia Grampone.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"DevSecOps: Redefiniendo las bases de la seguridad con el An\u00e1lisis Est\u00e1tico del C\u00f3digo\" width=\"1300\" height=\"731\" src=\"https:\/\/www.youtube.com\/embed\/n22TJzGfjeY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Escr\u00edbenos para solicitar informaci\u00f3n de nuestros servicios<\/strong><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-contact-form-7-contact-form-selector\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f10081-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"10081\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/blog\/en\/wp-json\/wp\/v2\/posts\/11594#wpcf7-f10081-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/blog\/en\/wp-json\/wp\/v2\/posts\/11594#wpcf7-f10081-o1\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"10081\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f10081-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label> Full name<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Corporate email<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label>Job selection<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"menu-836\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" id=\"Puesto\" aria-required=\"true\" aria-invalid=\"false\" name=\"menu-836\"><option value=\"\">&#8212;Por favor, elige una opci\u00f3n&#8212;<\/option><option value=\"Director\">Director<\/option><option value=\"Subdirector\">Deputy director<\/option><option value=\"Gerente\">Manager<\/option><option value=\"Otros\">Other<\/option><\/select><\/span> <\/label>\n<\/p>\n<p><label>Area selection<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"menu-87\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" id=\"Area\" aria-required=\"true\" aria-invalid=\"false\" name=\"menu-87\"><option value=\"\">&#8212;Por favor, elige una opci\u00f3n&#8212;<\/option><option value=\"Direcci\u00f3n General\">Directorate-General<\/option><option value=\"Sistemas\">Systems<\/option><option value=\"Innovaci\u00f3n\">Innovation<\/option><option value=\"Transformaci\u00f3n Digital\">Digital Transformation<\/option><option value=\"Desarrollo de Software\">Software development<\/option><option value=\"Marketing\">Marketing<\/option><option value=\"Finanzas\">Finance<\/option><option value=\"Recursos Humanos\">Human Resources<\/option><option value=\"Innovaci\u00f3n\">Innovation<\/option><option value=\"Operaciones\">Operations<\/option><option value=\"Log\u00edstica\">Logistics<\/option><option value=\"Otros\">Other<\/option><\/select><\/span> <\/label>\n<\/p>\n<p><label> Company<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-591\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"text-591\" \/><\/span><\/label>\n<\/p>\n<p><label> Phone<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel-496\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-496\" \/><\/span><\/label>\n<\/p>\n<p><label> Comments<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-894\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"textarea-894\"><\/textarea><\/span><br \/>\n<button class=\"wpcf7-form-control wpcf7-submit qodef-button qodef-size--normal qodef-layout--outlined qodef-m\" type=\"submit\"><span class=\"qodef-m-text\">Send<\/span><\/button><\/label>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Scanner, la herramienta de an\u00e1lisis de c\u00f3digo est\u00e1tico que est\u00e1 incluida en el Entorno de Desarrollo Integrado (IDE por sus siglas en ingl\u00e9s) de GeneXus, con el objetivo de mejorar la seguridad de las aplicaciones desarrolladas con nuestra plataforma Low-Code. El an\u00e1lisis de c\u00f3digo est\u00e1tico son las inspecciones que se realizan en el c\u00f3digo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11600,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[108,84,99,93],"tags":[],"class_list":["post-11594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desarrollo-de-aplicaciones","category-genexus","category-low-code","category-transformacion-digital"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bissoluciones.com\/blog\/en\/security-scanner-una-herramienta-de-analisis-estatico\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG\" \/>\n<meta property=\"og:description\" content=\"Security Scanner, la herramienta de an\u00e1lisis de c\u00f3digo est\u00e1tico que est\u00e1 incluida en el Entorno de Desarrollo Integrado (IDE por sus siglas en ingl\u00e9s) de GeneXus, con el objetivo de mejorar la seguridad de las aplicaciones desarrolladas con nuestra plataforma Low-Code. El an\u00e1lisis de c\u00f3digo est\u00e1tico son las inspecciones que se realizan en el c\u00f3digo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bissoluciones.com\/blog\/en\/security-scanner-una-herramienta-de-analisis-estatico\/\" \/>\n<meta property=\"og:site_name\" content=\"BIS SOLUCIONES BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-02T17:11:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-02T19:39:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/person\/1b4490a1f8c658698183a0d808368ac4\"},\"headline\":\"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico\",\"datePublished\":\"2023-05-02T17:11:21+00:00\",\"dateModified\":\"2023-05-02T19:39:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/\"},\"wordCount\":417,\"publisher\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png\",\"articleSection\":[\"Desarrollo de Aplicaciones\",\"GeneXus\",\"Low Code\",\"Transformaci\u00f3n Digital\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/\",\"url\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/\",\"name\":\"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png\",\"datePublished\":\"2023-05-02T17:11:21+00:00\",\"dateModified\":\"2023-05-02T19:39:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage\",\"url\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png\",\"contentUrl\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png\",\"width\":1080,\"height\":566},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/bissoluciones.com\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#website\",\"url\":\"https:\/\/bissoluciones.com\/blog\/en\/\",\"name\":\"BIS SOLUCIONES BLOG\",\"description\":\"Blog de Tecnolog\u00eda\",\"publisher\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bissoluciones.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#organization\",\"name\":\"BIS SOLUCIONES BLOG\",\"url\":\"https:\/\/bissoluciones.com\/blog\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2022\/03\/cropped-b1.png\",\"contentUrl\":\"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2022\/03\/cropped-b1.png\",\"width\":126,\"height\":42,\"caption\":\"BIS SOLUCIONES BLOG\"},\"image\":{\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/person\/1b4490a1f8c658698183a0d808368ac4\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/bissoluciones.com\/blog\"],\"url\":\"https:\/\/bissoluciones.com\/blog\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bissoluciones.com\/blog\/en\/security-scanner-una-herramienta-de-analisis-estatico\/","og_locale":"en_US","og_type":"article","og_title":"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG","og_description":"Security Scanner, la herramienta de an\u00e1lisis de c\u00f3digo est\u00e1tico que est\u00e1 incluida en el Entorno de Desarrollo Integrado (IDE por sus siglas en ingl\u00e9s) de GeneXus, con el objetivo de mejorar la seguridad de las aplicaciones desarrolladas con nuestra plataforma Low-Code. El an\u00e1lisis de c\u00f3digo est\u00e1tico son las inspecciones que se realizan en el c\u00f3digo [&hellip;]","og_url":"https:\/\/bissoluciones.com\/blog\/en\/security-scanner-una-herramienta-de-analisis-estatico\/","og_site_name":"BIS SOLUCIONES BLOG","article_published_time":"2023-05-02T17:11:21+00:00","article_modified_time":"2023-05-02T19:39:22+00:00","og_image":[{"width":1080,"height":566,"url":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#article","isPartOf":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/"},"author":{"name":"admin","@id":"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/person\/1b4490a1f8c658698183a0d808368ac4"},"headline":"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico","datePublished":"2023-05-02T17:11:21+00:00","dateModified":"2023-05-02T19:39:22+00:00","mainEntityOfPage":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/"},"wordCount":417,"publisher":{"@id":"https:\/\/bissoluciones.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage"},"thumbnailUrl":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png","articleSection":["Desarrollo de Aplicaciones","GeneXus","Low Code","Transformaci\u00f3n Digital"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/","url":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/","name":"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico - BIS SOLUCIONES BLOG","isPartOf":{"@id":"https:\/\/bissoluciones.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage"},"image":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage"},"thumbnailUrl":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png","datePublished":"2023-05-02T17:11:21+00:00","dateModified":"2023-05-02T19:39:22+00:00","breadcrumb":{"@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#primaryimage","url":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png","contentUrl":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2023\/05\/codigo-estatico.png","width":1080,"height":566},{"@type":"BreadcrumbList","@id":"https:\/\/bissoluciones.com\/blog\/security-scanner-una-herramienta-de-analisis-estatico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/bissoluciones.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Security Scanner: una herramienta de an\u00e1lisis est\u00e1tico"}]},{"@type":"WebSite","@id":"https:\/\/bissoluciones.com\/blog\/en\/#website","url":"https:\/\/bissoluciones.com\/blog\/en\/","name":"BIS SOLUCIONES BLOG","description":"Blog de Tecnolog\u00eda","publisher":{"@id":"https:\/\/bissoluciones.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bissoluciones.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bissoluciones.com\/blog\/en\/#organization","name":"BIS SOLUCIONES BLOG","url":"https:\/\/bissoluciones.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2022\/03\/cropped-b1.png","contentUrl":"https:\/\/bissoluciones.com\/blog\/wp-content\/uploads\/2022\/03\/cropped-b1.png","width":126,"height":42,"caption":"BIS SOLUCIONES BLOG"},"image":{"@id":"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bissoluciones.com\/blog\/en\/#\/schema\/person\/1b4490a1f8c658698183a0d808368ac4","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7268cb1ce11868b3875eb342228c3a5c8c9239ac6a9257d8c5b0de13304de95e?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/bissoluciones.com\/blog"],"url":"https:\/\/bissoluciones.com\/blog\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=11594"}],"version-history":[{"count":4,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11594\/revisions"}],"predecessor-version":[{"id":11601,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/posts\/11594\/revisions\/11601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/media\/11600"}],"wp:attachment":[{"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=11594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=11594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bissoluciones.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=11594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}