Sonar Blog

Home

BLOG

Sonar's latest blog posts

Featured Post

Building Confidence and Trust in AI-Generated Code

To tackle the accountability and ownership challenge accompanying AI-generated code, we are introducing Sonar AI Code Assurance

Read More
https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/0bd6c0bc-c921-485b-8570-8de7e1384983/AI%20Code%20Assurance_square-index%402x.png
https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/a2b0b9e4-30f0-4183-80c0-8dd86152a324/shifting_right_for_secure_platforms_and_devops_blog_index.webp
Blog post

Shifting Right for Secure Platforms and DevOps

Dev tooling is not only helping shift issues left, but the tools also help identify issues that happen later, or to the right, in the development lifecycle. Like detecting secrets before they go into production or platform configuration issues.

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/f1052fde-539c-4934-8274-323f48ca2757/highlights_hexacon_2023_blog_index.webp
Blog post

Highlights from Hexacon 2023

Last week, members of our AppSec and Vulnerability Research teams attended the Hexacon in Paris to learn, share, and network. Read more about our highlights.

Read article >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/77ae853a-51ae-474b-b9ab-04e7629ada1d/what_is_clean_code_blog_index.webp
Blog post

What is Clean Code?

If you’ve followed us for a while, you most likely noticed that we changed the way we describe what we do. It feels like in the last couple of years, we finally managed to settle on what we had been looking for from the beginning: Clean Code. But what is Clean Code, and what does it encompass?

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/3f0f356e-ad73-4f7b-8c76-ef2489feb469/Hero.webp
Blog post

Security Vulnerabilities in CasaOS

We recently uncovered two critical code vulnerabilities in the personal cloud system CasaOS. Let's see what we can learn from them.

Read article >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/2f9f9f8c-2c32-4b09-9f3a-544fc9dafbaf/java_sast_benchmark_why_you_shouldnt_trust_them_blindly_blog_index.webp
Blog post

Java SAST Benchmarks: why you shouldn't trust them blindly

Java SAST Benchmarks: why you shouldn't trust them blindly

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/7031f784-ed58-4cbb-9054-5a352e680357/interview_with_java_devs_blog_index.webp
Blog post

Interview with Sonar Java Enthusiasts

Interview with Sonar Java Enthusiasts

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/7fdaf01f-8f86-4022-981e-a4b578ab24a2/ismg_interview_blog_index.webp
Blog Post

ISMG Interview - Securing Applications, Accelerating DevOps with Clean Code

Sonar founder and co-CEO, Olivier Gaudin, sits down with ISMG's Tom Field at Black Hat USA 2023 to discuss how development can be improved to avoid security issues.

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/78644db9-2502-475a-ae0b-ee50203bd1bf/cpp_podcast_key_take_aways_blog_index.webp
Blog post

Why I’m passionate about Static Analysis and how I helped make it better

Why I’m passionate about Static Analysis and how I helped make it better

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/22b2d211-1dae-47d2-a6a1-a733028c3381/redos_attacks_in_javascript_blog_index.webp
Blog post

A comprehensive guide to the dangers of Regular Expressions in JavaScript

A deep investigation into regular expression denial of service (ReDoS) vulnerabilities in JavaScript

Read blog post >

https://assets-eu-01.kc-usercontent.com:443/093b835c-5333-0132-0526-5bdca2623961/77ca6fd8-b2f6-48fb-b993-34ffcfd141a5/openrefine_zip_slip_blog_index.webp
Blog post

Unzipping Dangers: OpenRefine Zip Slip Vulnerability

Extracting archives can be very dangerous. Read more about a critical Zip Slip vulnerability SonarCloud detected in the open-source application OpenRefine.

Read article >

Sonar's Scoring on the Top 3 Java SAST Benchmarks
Blog post

Sonar's Scoring on the Top 3 Java SAST Benchmarks

Enhancing SAST Detection: Sonar's Scoring on the Top 3 Java SAST Benchmarks

Read blog post >