Sonar Blog

Home

Blog

Sonar's latest blog posts

Featured Post

What is Clean Code?

If you’ve followed us for a while, you most likely noticed that we changed the way we describe what we do: from “code quality” to “continuous code inspection,” then “code quality and code security”… to Clean Code.


But what is Clean Code, and what does it encompass?

Read More
https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/ddb995eb-cb89-4435-82fb-1b937cdf11dc/what_is_clean_code_blog_feature.webp
https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/93a64a05-fe40-4c98-9145-de84ccf8bd3b/juliet_c_security_benchmark_the_securestring_case_blog_index.webp
Blog post

Juliet C# Benchmark and the SecureString case

Juliet C# is a project from the National Institute of Standards and Technology of the USA. As a security benchmark project, we used Juliet C# 1.3 to test and improve our C# analyzer. Here is a glimpse of the work we did around Juliet and some of its test cases related to the SecureString .NET type.

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/15632114-af55-440e-85bd-72b9a9f67069/the_importance_of_verifying_message_origins_blog_index.webp
Blog post

Who are you? The Importance of Verifying Message Origins

This blog post highlights the importance of verifying the origin of JavaScript message events and outlines the potential impact of omitting this by detailing two critical vulnerabilities in the Squidex application.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/abef1f96-f752-4016-8fb8-43788dcf920e/Vulnerabilities%20in%20Jenkins_blog_index.webp
Blog post

Excessive Expansion: Uncovering Critical Security Vulnerabilities in Jenkins

This blog uncovers two vulnerabilities, a Critical and High severity, recently discovered by our research team. Exploiting these vulnerabilities, attackers have the potential to gain Remote Code Execution on a Jenkins instance.

Read article >

Image of Blazor support by Sonar
Blog post

Sonar is helping make C# code clean as Microsoft ASP.NET Core Blazor application development grows

Sonar is helping make C# code clean as Microsoft ASP.NET Core Blazor application development grows

Read blog post >

The SonarQube and React logos
Blog post

Lessons learned upgrading to React 18 in SonarQube

We share the biggest three issues we faced and the lessons we learned as we upgraded SonarQube to React 18.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/64df6ab9-c247-4c0d-b62e-3bb168077339/vulnerability_research_highlights_blog_index.webp
Blog post

Vulnerability Research Highlights 2023

Our Vulnerability Research team looks back at a great year and summarizes the highlights of 2023.

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/13294037-5b6b-404a-8593-5751003436e3/c_sast_benchmarks_blog_index.webp
Blog post

Sonar's Scoring on the Top 3 Python SAST Benchmarks

We're excited to share not only how Sonar performs on Python benchmarks but also the ground truth corresponding to the list of expected and not-so-expected issues.

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/5bf25ac4-d412-48eb-a98f-1de2363ffeab/devops_predictions_blog_index.webp
Blog post

2024 DevOps Predictions from the Sonar Developer Advocate Team

The Developer Advocate team shares their predictions on what they foresee for DevOps trends and hot topics in 2024.

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/5c31ddcb-0f0b-45f6-9ef6-dbd445f6025a/2024_security_predictions_blog_index.webp
Blog post

2024 Security Predictions from the Sonar Research Team

Reflecting on changes in the industry over the past year, as well as the research we’ve published, the Sonar Vulnerability Research team came together and compiled our thoughts on what we foresee for cybersecurity in 2024.

Read Blog post >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/1617c8c9-0faa-4f13-9d13-05721dd7ef2a/sonar_at_blackhat_eu_blog_index.webp
Blog post

Sonar @ Black Hat Europe!

Last week, several SonarSourcers traveled to London to attend our third Black Hat event of the year. Here's what happened!

Read article >

https://assets-eu-01.kc-usercontent.com:443/b1ac63b6-1e65-01f4-6f38-e97c0e9214a1/bf453bc7-6980-489e-9b4d-09ff939c983d/pfsense_code_vulnerabilities_blog_index.webp
Blog post

pfSense Security: Sensing Code Vulnerabilities with SonarCloud

Our Clean Code solution SonarCloud discovered multiple vulnerabilities leading to remote code execution on pfSense CE 2.7.0. Let's see how SonarCloud found them and how it can keep your code clean.

Read blog post >