<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments for Codenteam	</title>
	<atom:link href="https://codenteam.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://codenteam.com/</link>
	<description>The AI Diagnostic Lab for Tech Teams</description>
	<lastBuildDate>Fri, 21 Mar 2025 23:29:04 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		Comment on Software Composite Analysis (SCA): How secured are the dependencies? by SCA vs SAST: Understanding Key Application Security Testing Methods - Codenteam		</title>
		<link>https://codenteam.com/software-composite-analysis-sca-how-secured-are-the-dependencies/#comment-45</link>

		<dc:creator><![CDATA[SCA vs SAST: Understanding Key Application Security Testing Methods - Codenteam]]></dc:creator>
		<pubDate>Fri, 21 Mar 2025 23:29:04 +0000</pubDate>
		<guid isPermaLink="false">https://codenteam.com/?p=238270#comment-45</guid>

					<description><![CDATA[[&#8230;] tools to identify and mitigate security risks. Two essential approaches in the AppSec toolkit are Software Composition Analysis (SCA) and Static Application Security Testing (SAST). While both aim to strengthen application security, [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] tools to identify and mitigate security risks. Two essential approaches in the AppSec toolkit are Software Composition Analysis (SCA) and Static Application Security Testing (SAST). While both aim to strengthen application security, [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Understanding the OWASP Top 10 and Its Role in Technical Due Diligence by AI’s Generated Code Security Report: A+ or Epic Fail? Epic Fail! - Codenteam		</title>
		<link>https://codenteam.com/understanding-the-owasp-top-10-and-its-role-in-technical-due-diligence/#comment-44</link>

		<dc:creator><![CDATA[AI’s Generated Code Security Report: A+ or Epic Fail? Epic Fail! - Codenteam]]></dc:creator>
		<pubDate>Wed, 12 Mar 2025 15:13:28 +0000</pubDate>
		<guid isPermaLink="false">https://codenteam.com/?p=238743#comment-44</guid>

					<description><![CDATA[[&#8230;] For the criteria of what can be considered a vulnerability, we went with OWASP top 10. OWASP is one of the main go to references for security researchers, and it matters the most in techn&#8230;. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] For the criteria of what can be considered a vulnerability, we went with OWASP top 10. OWASP is one of the main go to references for security researchers, and it matters the most in techn&#8230;. [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
