Sonar Blog

Quality

BLOG

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png
https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/60dcda39-d99f-43ca-be65-d72439fc2c61/taint_analysis_landscape_index.webp
Blog post

The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator

This blog post explains how taint analysis tracks all data flows in an application’s source code to unveil deeply hidden vulnerabilities and showcases a critical vulnerability in the OpenAPI Generator discovered by SonarQube Cloud.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/8cf25ce0-1858-4367-8330-9e6b26eccf2c/Why%20Code%20Security%20Matters_landscape-index.png
Blog post

Why Code Security Matters - Even in Hardened Environments

This blog post showcases why fundamental code security is essential for an application despite all hardening measures applied in the underlying infrastructure.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/4b95b6e2-0011-473c-b492-b4e9f0d55dfd/dart%20support_landscape-index.webp
Blog post

Announcing Sonar's Support for Dart: Elevate Your Code Quality

Sonar now supports the Dart programming language

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/296c23e0-fbfe-434e-8c6d-aa1c903bce5e/sq-10.7_blog-index.webp
Blog post

SonarQube Server 10.7 Release Announcement

Sonar introduces powerful AI-driven features, expanded support for new and existing languages and frameworks, and deeper security, all to elevate your code quality. These updates bring significant advancements for developers and teams.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/b317978f-6ceb-4b3f-8128-508d618596a9/AI%20Code%20Assurance_landscape-index.webp
Blog post

Building Confidence and Trust in AI-Generated Code

Sonar AI Code Assurance is a robust and streamlined process for validating AI-generated code through a structured and comprehensive analysis.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/1c383359-8f9f-4f59-ab7c-617e6942c954/AI%20CodeFix_landscape-index.webp
Blog post

Instant Code Fixes at Your Fingertips: Announcing Sonar AI CodeFix

Sonar AI CodeFix is a powerful capability that suggests code fixes for issues discovered by our code analysis solutions SonarQube Server and SonarQube Cloud.

Read article >

Top Security Flaws hiding in your code
Blog post

Top Security Flaws hiding in your code right now - and how to fix them

Let's examine the three most common injection attack types—SQL injection, Deserialization Injection, and Logging Injection—and discuss ways to prevent them.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/f319fbfb-e548-4f2e-9d9c-59e1262c9619/iso-27001-compliance-landscape-index.webp
Blog post

How can Sonar help with ISO 27001 compliance?

Security standards such as ISO 27001 are crucial for businesses as they offer a structured framework for managing and safeguarding sensitive information.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/e503a8d1-03d9-4413-a51b-2e897698ac0c/pyspider_vulnerabilities_landscape_index.webp
Blog post

Basic HTTP Authentication Risk: Uncovering pyspider Vulnerabilities

pyspider uses the convenient “basic HTTP authentication” method, but browsers don’t take the extra step to protect users from CSRF attacks. Learn more on how SonarQube Cloud detected 2 vulnerabilities in this open-source project.

Read article >

https://assets-eu-01.kc-usercontent.com:443/c38a40ef-1d09-017e-4edf-e0b0b4578a0f/2219edcc-ac15-4f18-a165-0c3286785dec/how-to-choose-an-llm-in-software-development-square-index.webp
Blog post

How to Choose an LLM in Software Development

With so many Large Language Models (LLMs) out there, selecting the right LLM is crucial for any organization looking to integrate AI into its operations.

Read article >

Logo of SonarCloud and SonarQube next to each other for comparison.
Blog post

SonarQube Cloud or SonarQube Server, What's Right for Your Team?

Learn about the similarities and key differences between SonarQube Cloud and SonarQube Server and which one is best for your use case.

Read Blog post >

  • Legal documentation
  • Trust center
  • Follow SonarSource on Twitter
  • Follow SonarSource on Linkedin

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.