SonarQube_General.svg

Software Composition Analysis (SCA) - now available from Sonar

Secure your code and software supply chain with developer-first SCA - now included in SonarQube Advanced Security.

無料トライアルデモ
SCA

One integrated platform for all your code

code

Actionable code intelligence

SonarQube is the only integrated code quality and code security platform that delivers actionable code intelligence for first-party code, AI-generated code, and open source code—all in a single, integrated solution. No matter the source, you get a holistic view of your code’s health and security.

automatic

All-in-one code security analysis

SonarQube delivers an integrated solution for code quality, SAST, taint analysis, SCA, secrets detection, and IaC scanning. It provides comprehensive insights into bugs, vulnerabilities, CVEs, SBOMs, and licenses, streamlining your workflow and eliminating tool sprawl.

developer

Developer-centric workflow

See open source vulnerabilities and license issues directly in your PRs, CI/CD, and soon IDE. This direct feedback minimizes context switching, speeds up fixes, ensures secure dependencies, and clear risk policies keep your development pipeline unblocked.

code merge

Security compliance reports

Review the trend and severity of your security issues across single projects or entire application portfolios and generate compliance reports for industry standards such as PCI DSS, OWASP Top 10, CWE, STIG, and more. Scheduled reports allow convenient daily, weekly, or monthly delivery.

Ecosystem support

  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/4636791d-bbcc-4ea1-bf41-ea229c98fb4f/java-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/e8a34013-7557-479a-90d3-4a12f5781e49/kotlin-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/b01ba2b6-22e3-4cea-a5a5-8461c9610e50/scala-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/bf92a486-5516-4cc2-8ba9-b039774e9393/javascript-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/d240d626-bd00-4316-bf53-fb6802bdf0ae/typescript_Color.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/415cb8ee-89b6-4943-b827-e7857003eaa1/csharp-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/283e79ce-2fbb-4c08-9101-09b789e6c2d6/python-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/d14b9255-0256-4d69-a4c2-204a91f86c29/go-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/6bd5e308-60d3-4a1a-a769-b6186fd79a58/Rust-logo-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/8f623dfe-7e7a-4ca2-83c0-7721c87b4926/ruby-color-padding.svg
  • https://assets-eu-01.kc-usercontent.com:443/ef593040-b591-0198-9506-ed88b30bc023/23b5666b-a7a8-4a82-bc1e-2d90ecfdaf50/php-color-padding.svg

世界中の700万人以上の開発者に信頼されています

Santander
U.S. Army
Nvidia
Mercedes Benz

The challenge

Today's rapid development, AI code, and open source reliance are amplifying complex security risks that customers urgently need to minimize.

Security vulnerabilities

Vulnerabilities in open source dependencies expose applications to attacks. Ignoring production usage of open source packages can lead to breaches and disruptions. Attackers often weaponize disclosed vulnerabilities quickly, shrinking your remediation window. Without clear visibility and prioritization, teams drown in noisy alerts and unintentionally ship risk to production.

Image shows security vulnerabilities detected by SonarQube

License violations

Incompatible licenses create legal, compliance, and business risks. Automated license policies and enforcement in PRs and CI/CD surface prohibited or risky licenses early, before they reach production.

Image shows policy on third party extensions

Supply chain security

Your applications are built on a complex web of open source dependencies. How can you be sure their maintainers prioritize and follow secure software development practices? This lack of visibility creates significant risk in your supply chain. Transitive dependencies obscure provenance and risk paths. SBOMs and dependency graphs restore visibility and guide focused remediation.

Image shows a Json supply chain attack

Developer toil and fatigue

Chasing endless security alerts steals developer time from building features. Having to keep track of new security reports, how and where transitive packages came into the application, and managing the lifecycle of non-urgent vulnerabilities significantly amplifies this wasted effort and developer frustration. Automated triage that prioritizes exploitable risks and suppresses noise keeps developers focused on shipping value.

Image expresses developer toil and fatigue and how it can be fixed by SonarQube

SonarQube SCAがどのように解決するか

SonarQube SCAは開発者向けに構築されており、シームレスで、実用的で、統合されています。

脆弱性検出

SonarQubeは、依存関係にある既知の脆弱性を検出します。メンテナーの洞察、重大度および悪用可能性スコアにより、重要な問題を容易に優先順位付けして修正できます。

Learn more

ライセンスチェック

禁止または許可されているソフトウェアライセンスの事前定義セットから選択するか、独自のポリシーを定義します。自動チェックにより、互換性のないライセンスやリスクのあるライセンスが問題になる前に検出されます。

Learn more

SBOMの可視性

ソフトウェアサプライチェーンを完全に可視化します。アプリケーションの詳細なSBOMを生成・維持することで、監査や規制遵守を容易にします。

Learn more

メンテナネットワーク

Sonar は、オープンソース プロジェクトのメンテナーに報酬を支払い、安全なソフトウェア開発手法の遵守と文書化、独自の洞察の提供を求める積極的なアプローチを採用しています。

Learn more

Ready to secure your code?

  • Follow SonarSource on Twitter
  • Follow SonarSource on Linkedin
language switcher
日本語 (Japanese)
  • 法的文書
  • トラスト センター

© 2025 SonarSource Sàrl.無断複写・転載を禁じます。