Sonar Blog

Home

BLOG

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png
https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/77ae853a-51ae-474b-b9ab-04e7629ada1d/what_is_clean_code_blog_index.webp
Blog post

What is Clean Code?

If you’ve followed us for a while, you most likely noticed that we changed the way we describe what we do. It feels like in the last couple of years, we finally managed to settle on what we had been looking for from the beginning: Clean Code. But what is Clean Code, and what does it encompass?

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/3f0f356e-ad73-4f7b-8c76-ef2489feb469/Hero.webp
Blog post

Security Vulnerabilities in CasaOS

We recently uncovered two critical code vulnerabilities in the personal cloud system CasaOS. Let's see what we can learn from them.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/2f9f9f8c-2c32-4b09-9f3a-544fc9dafbaf/java_sast_benchmark_why_you_shouldnt_trust_them_blindly_blog_index.webp
Blog post

Java SAST Benchmarks: why you shouldn't trust them blindly

Java SAST Benchmarks: why you shouldn't trust them blindly

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/7031f784-ed58-4cbb-9054-5a352e680357/interview_with_java_devs_blog_index.webp
Blog post

Interview with Sonar Java Enthusiasts

Interview with Sonar Java Enthusiasts

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/7fdaf01f-8f86-4022-981e-a4b578ab24a2/ismg_interview_blog_index.webp
Blog Post

ISMG Interview - Securing Applications, Accelerating DevOps with Clean Code

Sonar founder and co-CEO, Olivier Gaudin, sits down with ISMG's Tom Field at Black Hat USA 2023 to discuss how development can be improved to avoid security issues.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/78644db9-2502-475a-ae0b-ee50203bd1bf/cpp_podcast_key_take_aways_blog_index.webp
Blog post

Why I’m passionate about Static Analysis and how I helped make it better

Why I’m passionate about Static Analysis and how I helped make it better

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/22b2d211-1dae-47d2-a6a1-a733028c3381/redos_attacks_in_javascript_blog_index.webp
Blog post

A comprehensive guide to the dangers of Regular Expressions in JavaScript

A deep investigation into regular expression denial of service (ReDoS) vulnerabilities in JavaScript

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/77ca6fd8-b2f6-48fb-b993-34ffcfd141a5/openrefine_zip_slip_blog_index.webp
Blog post

Unzipping Dangers: OpenRefine Zip Slip Vulnerability

Extracting archives can be very dangerous. Read more about a critical Zip Slip vulnerability SonarQube Cloud detected in the open-source application OpenRefine.

Read article >

Sonar's Scoring on the Top 3 Java SAST Benchmarks
Blog post

Sonar's Scoring on the Top 3 Java SAST Benchmarks

Enhancing SAST Detection: Sonar's Scoring on the Top 3 Java SAST Benchmarks

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/c98d8cef-13c5-41ae-99a2-5d1dffaa51c9/teamcity_vulnerability_blog_index.webp
Blog post

Source Code at Risk: Critical Code Vulnerability in CI/CD Platform TeamCity

Our Vulnerability Research team discovered a critical vulnerability in the popular CI/CD server TeamCity, which attackers could use to steal source code and poison build artifacts.

Read article >

https://assets-eu-01.kc-usercontent.com:443/7630306f-9a2f-018d-2726-3ef76ef712f4/bc352588-9c6f-4da9-ad87-305da97379c5/open_source_summit_summary_blog_index.webp
Blog Post

Open Source Summit 2023

Open Source Summit 2023

Read blog post >

  • Legal documentation
  • Trust center
  • Follow SonarSource on Twitter
  • Follow SonarSource on Linkedin

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.