Watch this video on YouTube
Which security practice involves assessing third-party code or libraries for potential security vulnerabilities before incorporating them into a software application?