Developer Glossary

Complete guide to code review, security, DevOps, and software quality terminology

50 terms

Code Review & Quality

(12)

Code Review

HOT

The systematic examination of source code by one or more developers to identify bugs, security vulnerabilities, and improve code quality before merging into the main codebase.

Static Analysis

HOT

The process of analyzing source code without executing it to find potential bugs, security vulnerabilities, and code quality issues.

Technical Debt

HOT

The implied cost of additional rework caused by choosing an easy (limited) solution now instead of using a better approach that would take longer.

Code Smell

HOT

A surface indication in the source code that usually corresponds to a deeper problem in the system. Not a bug itself, but a sign that refactoring may be needed.

Refactoring

HOT

The process of restructuring existing code without changing its external behavior to improve readability, reduce complexity, and make it easier to maintain.

Linting

The process of running a program that analyzes code for potential errors, bugs, stylistic issues, and suspicious constructs.

Clean Code

Code that is easy to understand, simple to modify, and clearly expresses the intent of the programmer. A philosophy popularized by Robert C. Martin.

Legacy Code

Existing code that is difficult to change due to lack of tests, poor documentation, outdated technologies, or original developers no longer available.

DRY Principle (Don't Repeat Yourself)

A software development principle stating that every piece of knowledge should have a single, authoritative representation in a system.

KISS Principle (Keep It Simple, Stupid)

A design principle that states systems work best when they are kept simple rather than made complex. Simplicity should be a key goal.

YAGNI (You Aren't Gonna Need It)

An Extreme Programming principle that states programmers should not add functionality until it is actually needed, avoiding speculative features.

Dead Code

Code that is never executed at runtime, including unreachable code, unused functions, and code hidden behind always-false conditions.

Security

(12)

SAST

HOT

Static Application Security Testing — a method of analyzing source code for security vulnerabilities without executing the program.

DAST

HOT

Dynamic Application Security Testing — a method of testing running applications for security vulnerabilities by simulating attacks.

OWASP

HOT

The Open Worldwide Application Security Project — a nonprofit foundation that works to improve software security through community-led open-source projects.

OWASP Top 10

HOT

A regularly updated list of the 10 most critical security risks to web applications, published by OWASP as a standard awareness document for developers.

CSRF (Cross-Site Request Forgery)

HOT

An attack that forces authenticated users to execute unwanted actions on a web application by tricking them into clicking malicious links or submitting forms.

Authentication

HOT

The process of verifying the identity of a user, device, or system. Answers the question "Who are you?" (contrasted with authorization, which answers "What can you do?").

Secrets Management

HOT

The practice of securely storing, distributing, and rotating sensitive data like API keys, passwords, database credentials, and certificates.

Dependency Vulnerability

HOT

A security weakness in third-party libraries or packages that an application depends on, which can be exploited to compromise the application.

Code Scanning

HOT

Automated analysis of code to find security vulnerabilities, bugs, and code quality issues, typically integrated into CI/CD pipelines.

DevSecOps

An approach that integrates security practices into every phase of the DevOps pipeline, making security a shared responsibility across development, security, and operations teams.

SQL Injection

A code injection technique that exploits security vulnerabilities in an application's database layer by inserting malicious SQL statements into input fields.

XSS (Cross-Site Scripting)

A security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, potentially stealing session cookies, credentials, or performing actions on behalf of victims.

AI Code Review

(3)

DevOps & CI/CD

(5)

Testing

(7)

Git & Version Control

(7)

Metrics & Architecture

(4)

Automate Code Review with diffray

Multi-agent AI system for code review. Automatically finds bugs, security vulnerabilities, and architecture issues.