To get a trial key
fill out the form below
Team License (a basic version)
Enterprise License (an extended version)
* By clicking this button you agree to our Privacy Policy statement

Request our prices
New License
License Renewal
--Select currency--
* By clicking this button you agree to our Privacy Policy statement

Free PVS-Studio license for Microsoft MVP specialists
* By clicking this button you agree to our Privacy Policy statement

To get the licence for your open-source project, please fill out this form
* By clicking this button you agree to our Privacy Policy statement

I am interested to try it on the platforms:
* By clicking this button you agree to our Privacy Policy statement

Message submitted.

Your message has been sent. We will email you at

If you haven't received our response, please do the following:
check your Spam/Junk folder and click the "Not Spam" button for our message.
This way, you won't miss messages from our team in the future.

Why you should run static code analysis…

Why you should run static code analysis regularly and not from time to time (for instance, at "each release")

Apr 12 2011

While developing and helping people to use static code analyzers, we constantly encounter an inefficient approach to using these tools. Developers would launch the tool, find and fix interesting software errors and then launch the tool only from time to time, for instance, when a new version is released. This approach is destined to fail. I will tell you why.

In general, the most complicated and "heavy-going" stage in the process of using tools of static code analysis is their integration. The point is that any static analyzer always generates rather many messages (including false alarms) and you will anyway get plenty of these messages at first launches. You must somehow "force your way through" them - either fix errors in code or mark them as false alarms. This way or another, you must make the analyzer not generate these messages anymore. After that users often put the tool aside till "the next time", say, till preparing a new version of their products.

It is not right because again too many analyzer-generated messages will accumulate and you will feel reluctant to fix them. A correct way of using a static code analyzer is to run it regularly and fix detected issues at once. For instance, you may run static analysis nightly together with night builds.

There is another more crucial reason why irregular launch of a static analyzer is too inefficient. Most errors that could be detected by static code analysis at once are detected with the help of other testing methods instead. The cost and time of error fixing rise several times.

PVS-Studio has a mechanism that allows you to run code analysis from the command line. This method of launching the tool is very convenient to integrate into the procedure of night builds. In this case, all the project's files will be checked and at morning you may study the report with new errors found.

If analysis of all the files takes too much time (it is typical of large projects), you may set PVS-Studio to check only some files. Here you may read how to do that. In brief, you may either check files modified during the last day (or several days) or check only files specified in the list (the list itself is a file defined in the command line). In this case, first, you will get a list of new issues found in code every morning and, second, it will take you quite little time. The "Check only Files Modified In" setting might be useful when launching PVS-Studio manually while writing the code. For instance, having finished modification of a large program's fragment and made the code compile well, you may run PVS-Studio. The analyzer will quickly check only those files which have been modified today.

Popular related articles
PVS-Studio evolution: data flow analysis for related variables

Date: Apr 28 2022

Author: Nikita Lipilin

Related variables are one of the main problems of static analysis. This article covers this topic and describes how PVS-Studio developers are fighting false positives caused by different relationship…
SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

Date: Apr 19 2022

Author: Sergey Vasiliev

Vulnerabilities produce enormous reputational and financial risks. That's why many companies are fascinated by security and desire to build a secure development life cycle (SSDLC). So, today we're go…
PVS-Studio: static code analysis technology

Date: Jan 11 2022

Author: Andrey Karpov, Paul Eremeev

PVS-Studio provides static analyzers for C, C++, C# and Java languages on Windows, Linux and macOS platforms. PVS-Studio analyzers can vary slightly due to certain features that the languages have. H…
How to speed up building and analyzing of your project with Incredibuild?

Date: May 17 2021

Author: Maxim Zvyagintsev

"How much longer are you going to build it?" - a phrase that every developer has uttered at least once in the middle of the night. Yes, a build can be long and there is no escaping it. One does not s…
GTK: the first analyzer run in figures

Date: Jan 04 2021

Author: Svyatoslav Razmyslov

For some people, the introduction of a static analyzer into a project seems like an insurmountable obstacle. It is widely believed that the amount of analysis results issued after the first run is so…

Comments (0)

Next comments
This website uses cookies and other technology to provide you a more personalized experience. By continuing the view of our web-pages you accept the terms of using these files. If you don't want your personal data to be processed, please, leave this site.
Learn More →