Caspia Technologies' CODAx Linter Uncovers Security Flaws in OpenRISC CPU

Caspia Technologies has revealed that its CODAx AI-assisted security linter identified 16 security vulnerabilities in a popular OpenRISC CPU core, significantly outperforming existing industry tools.

Caspia Technologies has announced the impact of its CODAx AI-assisted security linter, which identified 16 security vulnerabilities in a popular OpenRISC CPU core, according to a press release. This open-source core is widely used in various embedded applications, including telecommunications and automotive industries.

CODAx employs over 150 security rules to conduct comprehensive static checks on design RTL, flagging code that could lead to security vulnerabilities. The tool's effectiveness was demonstrated by its ability to detect six control path and ten data-path security directive violations, compared to only two identified by the industry's golden reference linter. The analysis of approximately 32,000 lines of code was completed in under 60 seconds.

Caspia Technologies is engaging with leading semiconductor technology suppliers to showcase CODAx's capabilities and enhance security in development flows. Additionally, the company has launched a program allowing users to test CODAx on open-source designs for free, aiming to improve security testing efficiency and reduce costs.

We hope you enjoyed this article.

Consider subscribing to one of several newsletters we publish like Silicon Brief.

Also, consider following us on social media:

Subscribe to Cybersecurity AI Weekly

Weekly newsletter about AI in Cybersecurity.

Trend report

Cybersecurity Trends Report 2025

Netwrix

The Cybersecurity Trends Report 2025 by Netwrix Research Lab provides insights into how organizations are adapting their cybersecurity strategies amidst growing AI adoption. The report, based on a survey of 2,150 IT professionals from 121 countries, highlights key trends such as the increase in hybrid IT environments, AI-driven security challenges, and the rising costs of security incidents.

Read more