It detects vulnerabilities within the application by building a model of its execution state and applying rules based upon the code patterns that create common vulnerabilities (such as the use of untrusted user input as an input to an SQL query).
Some of the major vulnerability detection methodologies include: Developers and security teams have a number of options when performing code scanning.