This paper describes a method of addressing software attacks, e.g. Tro
jan horses on to software source code. Source code manipulation poses
various threats to the delivering of a safe system. Changes to source
code are usually controlled by change management software. Change mana
gement software does not detect security-related risks, which might be
imbedded in the source code as a result of changes made to the source
code. This paper describes a method, by means of an example, of a pos
sible way in which to identify and secure possible risk patterns in th
e source code by use of visualisation and pattern recognising techniqu
es. A prototype of the visual risk analyser is used on a program illus
trative of the different phases of the visualisation method.