How do developers choose tools to identify and avoid vulnerabilities in embedded software for automobiles?

How do developers choose tools to identify and avoid vulnerabilities in embedded software for automobiles?