beSTORM tests the binary application, and is therefore completely indifferent to the programming language or system libraries used. This allows a separate testing team that may not have access to the source code to use beSTORM for security testing of the application. 


beSTORM will report the exact interaction that triggers the vulnerability. You can send this report to the programmers, and they can now debug the application in the desired development environment to see what causes the fault.