Sonar Blog

Home

Blog

Sonar's latest blog posts

Featured Post

What is Clean Code?

If you’ve followed us for a while, you most likely noticed that we changed the way we describe what we do: from “code quality” to “continuous code inspection,” then “code quality and code security”… to Clean Code.


But what is Clean Code, and what does it encompass?

Read More
https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/ddb995eb-cb89-4435-82fb-1b937cdf11dc/what_is_clean_code_blog_feature.webp
https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/a9721003-a658-4ae8-a32e-9fdee3a84740/java_21_new_rules_blog_index.webp
Blog Post

Ensuring the right usage of Java 21 new features

Last September 2023 Java 21 was released as the latest LTS (Long Time Support). But taking advantage of the changes and new features, which we are not used to including in our code, can be a tough task. Also, it can lead to improper use or poor uptake, bugs, or basically not taking full advantage of new improvements.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/69c9a58f-4ba6-4c43-be6c-1b5f6d5a4db0/development_speed_and_code_quality_blog_index.webp
Blog post

Technical debt’s impact on development speed and code quality

By acknowledging the impact of technical debt and embracing proactive solutions like Sonar, development teams can mitigate its effects and build software that is resilient, reliable, and scalable.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/705b838c-d9ff-4043-bfbc-f16b478b86c8/dora_compliance_blog_index.webp
Blog post

DORA Compliance for Financial Entities

Leveraging Sonar solutions to ensure code security by design

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/58960610-017f-4c9a-ad03-0fd8c166cd7b/vulnerabilities_in_erxes_blog_index.webp
Blog post

Micro Services, Major Headaches: Detecting Vulnerabilities in Erxes' Microservices

Our vulnerability researchers discovered critical vulnerabilities in Erxes with the help of SonarCloud. Learn about the details and how to triage such issues in your own code!

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/194832d8-073b-458c-b7b3-116063be9efb/dirname_in_es_modules_blog_index.webp
Blog post

__dirname is back in Node.js with ES modules

Node.js is reducing friction when using ES modules by making it easier to get the current module directory name

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/09066b98-a5f5-41aa-9c0a-98ac0e42cbf8/clean_code_tips_blog_index.webp
Blog post

#CleanCodeTips: Unlock Your Coding Potential

As software development evolves, keeping up with best practices, the latest trends, and ensuring your code remains top-notch can feel like sailing uncharted waters. Sonar has the Clean Code tips for you!

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/75e7d0c4-4811-4a1f-853b-ab1c4b907e17/r_c_e_vulnerability_mailspring_blog_index.webp
Blog post

Reply to calc: The Attack Chain to Compromise Mailspring

Learn how an attacker can combine multiple security vulnerabilities to achieve arbitrary code execution on a victim that tries to reply or forward a malicious mail in Mailspring.

Read article >

SonarQube and PCI DSS 4.0
Blog post

Are You Ready For PCI DSS 4.0?

PCI DSS 3.2.1 is being retired on March 31, 2024. Are you ready for the new standard, PCI DSS 4.0?

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/9c571123-24c2-4b5a-881e-d78b383e3254/pattern_matching_in_java_blog_index%20%282%29.webp
Blog Post

Increase readability with Java's Pattern Matching

Increase readability, reduce cognitive complexity, and avoid bugs that are hard to spot with Java's Pattern Matching.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/e9c9976c-6a7a-4723-9a4a-d1ace3f30ea8/opennms_vulnerabilities_blog_index.webp
Blog post

OpenNMS Vulnerabilities: Securing Code against Attackers’ Unexpected Ways

Learn which unexpected ways attackers may take to exploit code vulnerabilities and how to secure against them.

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/4ef3a97b-688d-40e2-b56e-f9e262a742a9/white_house_memory_safe_blog_index.webp
Blog post

White House emphasizes need for proactive coding practices to counter cyber attacks

The ONCD recent report puts a spotlight on one of the most foundational issues that result in insecure software. Sonar applauds the administration’s call for addressing software vulnerabilities at the programming language and source code levels.

Read blog post >