<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Freddy+Mallet</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Freddy+Mallet"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Freddy_Mallet"/>
		<updated>2026-05-17T14:42:10Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=195672</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=195672"/>
				<updated>2015-06-02T20:21:34Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
* To suggest a rule, send as much as possible from the following list:&lt;br /&gt;
** description - What should be done/not done, and why&lt;br /&gt;
** noncompliant code example in the language of your choice&lt;br /&gt;
** remediation action - This can be as simple as &amp;quot;Don't do X.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@owasp.org Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-csharp C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 19 May 2015: Release of [http://www.sonarsource.com/2015/05/19/sonarqube-java-3-3-released/ the SonarQube Java plugin version 3.3] adds 7 new rules, including 4 related to bug detection.&lt;br /&gt;
&lt;br /&gt;
* 19 May 2015: Release of [http://www.sonarsource.com/2015/05/19/sonarqube-php-2-5-released/ the SonarQube PHP plugin version 2.5] adds 7 new rules, including 5 related to bug detection and error handling.&lt;br /&gt;
&lt;br /&gt;
* 30 April 2015: Release of [http://www.sonarsource.com/2015/04/30/sonarqube-java-3-2-released/ the SonarQube Java plugin version 3.2] adds a rule to find unclosed resources, which can help prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
* 23 April 2015: Release of [http://www.sonarsource.com/2015/04/23/sonarqube-javascript-2-5-released/ the SonarQube JavaScript plugin version 2.5] adds 13 new rules, including seven related to bug or pitfall detection, including&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-1854 RSPEC 1854] Dead stores should be removed&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-888 RSPEC-888] Equality operators should not be used in &amp;quot;for&amp;quot; loop termination conditions&lt;br /&gt;
&lt;br /&gt;
* 3 April 2015: Release of [http://www.sonarsource.com/2015/04/03/sonarqube-java-3-1-released/ the SonarQube Java plugin version 3.1] adds seven new rules related to bug detection, including a powerful new rule able to detect null pointer dereferences.&lt;br /&gt;
&lt;br /&gt;
* 2 April 2015: Release of [http://www.sonarsource.com/2015/04/02/sonarqube-javascript-2-4-released/ the SonarQube JavaScript plugin version 2.4] adds 15 new rules related to bug detection, including one which is also related to security:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2228 RSPEC-2228] Console logging should not be used&lt;br /&gt;
&lt;br /&gt;
* 9 March 2015: With its latest release, version 3.0 on 4 March 2015, the SonarQube Java plugin now covers 50 different CWE items. [http://dist.sonarsource.com/reports/coverage/squid_cwe_coverage.html See the full list]&lt;br /&gt;
&lt;br /&gt;
* 4 March 2015: Release of [http://www.sonarsource.com/2015/03/04/sonarqube-java-3-0-released/ SonarQube Java 3.0 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11895 24 new rules], including 14 related to bug detection and 6 related to the detection of multi-threading issues.&lt;br /&gt;
&lt;br /&gt;
* 5 February 2015: Release of [http://www.sonarsource.com/2015/02/05/sonarqube-java-2-9-1-released/ SonarQube Java 2.9.1 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11894 19 new rules] including 1 related to OWASP Top 10:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2257 RSPEC-2257] Only standard cryptographic algorithms should be used&lt;br /&gt;
&lt;br /&gt;
* 5 January 2015: Release of [http://www.sonarsource.com/2015/01/09/sonarqube-java-2-8-released/ SonarQube Java 2.8 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11893 25 new rules] including several related to OWASP Top 10:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2277 RSPEC-2277] Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2078 RSPEC-2078] Values passed to LDAP queries should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2076 RSPEC-2076] Values passed to OS commands should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2278 RSPEC-2278] DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.sonarsource.com/browse/SONARJAVA/fixforversion/11892 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2068 RSPEC-2068] Credentials should not be hard-coded&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2245 RSPEC-2245] Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255] Cookies should not be used to store sensitive information&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089] HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2070 RSPEC-2070] SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254] &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258] &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2278 RSPEC-2278] DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2277 RSPEC-2277] Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258]	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2257 RSPEC-2257]	Only standard cryptographic algorithms should be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255]	Cookies should not be used to store sensitive information&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254]	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2077 RSPEC-2077]	Values passed to SQL commands should be sanitized&lt;br /&gt;
&lt;br /&gt;
* 2 October 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2092 RSPEC-2092]	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2091 RSPEC-2091]	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089]	HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2087 RSPEC-2087]	Weak encryption should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2086 RSPEC-2086]	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2085 RSPEC-2085]	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2084 RSPEC-2084]	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2083 RSPEC-2083]	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186870</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186870"/>
				<updated>2014-12-12T15:34:53Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2068 RSPEC-2068] Credentials should not be hard-coded&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2245 RSPEC-2245] Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255] Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089] HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2070 RSPEC-2070] SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254] &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258] &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2278 RSPEC-2278] DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2277 RSPEC-2277] Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258]	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2257 RSPEC-2257]	Only standard cryptographic algorithms should be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255]	Cookies should not be used to store sensitive information&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254]	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2077 RSPEC-2077]	Values passed to SQL commands should be sanitized&lt;br /&gt;
&lt;br /&gt;
* 2 October 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2092 RSPEC-2092]	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2091 RSPEC-2091]	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089]	HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2087 RSPEC-2087]	Weak encryption should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2086 RSPEC-2086]	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2085 RSPEC-2085]	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2084 RSPEC-2084]	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2083 RSPEC-2083]	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186869</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186869"/>
				<updated>2014-12-12T15:12:42Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** RSPEC-2068 Credentials should not be hard-coded&lt;br /&gt;
** RSPEC-2245 Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** RSPEC-2092 Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2089 HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2070 SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** RSPEC-2254 &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** RSPEC-2258 &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** RSPEC-2278 DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** RSPEC-2277 Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** RSPEC-2258	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** RSPEC-2257	Only standard cryptographic algorithms should be used&lt;br /&gt;
** RSPEC-2255	Cookies should not be used to store sensitive information&lt;br /&gt;
** RSPEC-2254	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 2 October 201 : 2 new rules specified&lt;br /&gt;
** RSPEC-2092	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2091	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** RSPEC-2089	HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2087	Weak encryption should not be used&lt;br /&gt;
** RSPEC-2086	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** RSPEC-2085	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** RSPEC-2084	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** RSPEC-2083	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186868</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186868"/>
				<updated>2014-12-12T15:11:52Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** RSPEC-2068 Credentials should not be hard-coded&lt;br /&gt;
** RSPEC-2245 Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** RSPEC-2092 Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2089 HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2070 SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** RSPEC-2254 &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** RSPEC-2258 &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** RSPEC-2278 DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** RSPEC-2277 Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** RSPEC-2258	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** RSPEC-2257	Only standard cryptographic algorithms should be used&lt;br /&gt;
** RSPEC-2255	Cookies should not be used to store sensitive information&lt;br /&gt;
** RSPEC-2254	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 2 October 201 : 2 new rules specified&lt;br /&gt;
** RSPEC-2092	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2091	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** RSPEC-2089	HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2087	Weak encryption should not be used&lt;br /&gt;
** RSPEC-2086	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** RSPEC-2085	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** RSPEC-2084	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** RSPEC-2083	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186867</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186867"/>
				<updated>2014-12-12T15:10:50Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
&lt;br /&gt;
The [https://www.owasp.org/index.php/OWASP_SonarQube_Project#tab=News news section] is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** RSPEC-2068 Credentials should not be hard-coded&lt;br /&gt;
** RSPEC-2245 Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** RSPEC-2092 Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2089 HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2070 SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** RSPEC-2254 &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** RSPEC-2258 &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** RSPEC-2278 DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** RSPEC-2277 Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** RSPEC-2258	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** RSPEC-2257	Only standard cryptographic algorithms should be used&lt;br /&gt;
** RSPEC-2255	Cookies should not be used to store sensitive information&lt;br /&gt;
** RSPEC-2254	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 2 October 201 : 2 new rules specified&lt;br /&gt;
** RSPEC-2092	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2091	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** RSPEC-2089	HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2087	Weak encryption should not be used&lt;br /&gt;
** RSPEC-2086	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** RSPEC-2085	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** RSPEC-2084	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** RSPEC-2083	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186866</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186866"/>
				<updated>2014-12-12T15:09:17Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
&lt;br /&gt;
The news section is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** RSPEC-2068 Credentials should not be hard-coded&lt;br /&gt;
** RSPEC-2245 Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** RSPEC-2092 Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2089 HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2070 SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** RSPEC-2254 &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** RSPEC-2258 &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** RSPEC-2278 DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** RSPEC-2277 Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** RSPEC-2258	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** RSPEC-2257	Only standard cryptographic algorithms should be used&lt;br /&gt;
** RSPEC-2255	Cookies should not be used to store sensitive information&lt;br /&gt;
** RSPEC-2254	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 2 October 201 : 2 new rules specified&lt;br /&gt;
** RSPEC-2092	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2091	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** RSPEC-2089	HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2087	Weak encryption should not be used&lt;br /&gt;
** RSPEC-2086	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** RSPEC-2085	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** RSPEC-2084	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** RSPEC-2083	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186865</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186865"/>
				<updated>2014-12-12T15:07:06Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : http://jira.sonarsource.com/browse/RSPEC.&lt;br /&gt;
&lt;br /&gt;
The news section is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.codehaus.org/secure/ReleaseNote.jspa?projectId=12830&amp;amp;version=20752 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** RSPEC-2068 Credentials should not be hard-coded&lt;br /&gt;
** RSPEC-2245 Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** RSPEC-2092 Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2089 HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2070 SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** RSPEC-2254 &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** RSPEC-2258 &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** RSPEC-2278 DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** RSPEC-2277 Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** RSPEC-2258	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** RSPEC-2257	Only standard cryptographic algorithms should be used&lt;br /&gt;
** RSPEC-2255	Cookies should not be used to store sensitive information&lt;br /&gt;
** RSPEC-2254	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 2 October 201 : 2 new rules specified&lt;br /&gt;
** RSPEC-2092	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** RSPEC-2091	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** RSPEC-2089	HTTP referers should not be relied on&lt;br /&gt;
** RSPEC-2087	Weak encryption should not be used&lt;br /&gt;
** RSPEC-2086	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** RSPEC-2085	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** RSPEC-2084	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** RSPEC-2083	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186863</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186863"/>
				<updated>2014-12-12T14:47:06Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : http://jira.sonarsource.com/browse/RSPEC.&lt;br /&gt;
&lt;br /&gt;
The news section is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
* 1 December 2014 : +20 rules relating to OWASP Top 10 and targeting Java already specified in the [http://jira.sonarsource.com/browse/RSPEC-1877?jql=labels%20%3D%20owasp-top10 SonarSource Rules Repository]&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186862</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186862"/>
				<updated>2014-12-12T14:45:22Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targetting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy :&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://lists.owasp.org/mailman/listinfo/owasp_sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : http://jira.sonarsource.com/browse/RSPEC.&lt;br /&gt;
&lt;br /&gt;
The news section is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://docs.codehaus.org/display/SONAR/Java+Plugin Java], [http://docs.sonarqube.org/display/SONAR/JavaScript+Plugin JavaScript], [http://docs.sonarqube.org/display/SONAR/PHP+Plugin PHP] and [http://docs.sonarqube.org/display/SONAR/C%23+Plugin C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
* 1 December 2014 : +20 rules relating to OWASP Top 10 and targeting Java already specified in the [http://jira.sonarsource.com/browse/RSPEC-1877?jql=labels%20%3D%20owasp-top10 SonarSource Rules Repository]&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
SonarQube is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186854</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186854"/>
				<updated>2014-12-12T12:17:28Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Email List */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP SonarQube Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Sonarqube Project is intended to track the implementation in SonarQube langauge plugins of security rules, like those in the OWASP Top10, ASVS, PCI-DSS, ISO 27034ASC, &amp;amp;etc.&lt;br /&gt;
&lt;br /&gt;
==Introduction to SonarQube==&lt;br /&gt;
&lt;br /&gt;
SonarQube is an open platform for managing code quality. As such, it covers the 7 axes of code quality:&lt;br /&gt;
&lt;br /&gt;
http://www.sonarqube.org/wp-content/themes/sonar/images/7axes.png&lt;br /&gt;
&lt;br /&gt;
More than 20 programming languages are covered through plugins, including: Java, C#, C/C++, PL/SQL, Cobol, ABAP, …&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
Deliver a set of rules marked with relevant tags (E.G. owasp-top10, cwe, sans-top25) to make adoption of security rules as painless as possible.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
=== November 2014 ===&lt;br /&gt;
We've added an &amp;quot;owasp-top10&amp;quot; tag to existing rules, mainly in the FindBugs plugins.&lt;br /&gt;
&lt;br /&gt;
=== October 2014 ===&lt;br /&gt;
We've mapped the existing [http://jira.sonarsource.com/browse/RSPEC-2260?jql=project%20%3D%20RSPEC%20AND%20resolution%20%3D%20Unresolved%20AND%20type%20%3D%20Specification SonarQube rule specifications] to CWE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Open HUB ==&lt;br /&gt;
[https://www.openhub.net/p/sonar SonarQube rating on Open HUB]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
* 1 December 2014 : +20 rules relating to OWASP Top 10 and targeting Java already specified in the [http://jira.sonarsource.com/browse/RSPEC-1877?jql=labels%20%3D%20owasp-top10 SonarSource Rules Repository]&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
SonarQube is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186853</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=186853"/>
				<updated>2014-12-12T12:17:12Z</updated>
		
		<summary type="html">&lt;p&gt;Freddy Mallet: /* Email List */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP SonarQube Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Sonarqube Project is intended to track the implementation in SonarQube langauge plugins of security rules, like those in the OWASP Top10, ASVS, PCI-DSS, ISO 27034ASC, &amp;amp;etc.&lt;br /&gt;
&lt;br /&gt;
==Introduction to SonarQube==&lt;br /&gt;
&lt;br /&gt;
SonarQube is an open platform for managing code quality. As such, it covers the 7 axes of code quality:&lt;br /&gt;
&lt;br /&gt;
http://www.sonarqube.org/wp-content/themes/sonar/images/7axes.png&lt;br /&gt;
&lt;br /&gt;
More than 20 programming languages are covered through plugins, including: Java, C#, C/C++, PL/SQL, Cobol, ABAP, …&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
Deliver a set of rules marked with relevant tags (E.G. owasp-top10, cwe, sans-top25) to make adoption of security rules as painless as possible.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [ttp://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
=== November 2014 ===&lt;br /&gt;
We've added an &amp;quot;owasp-top10&amp;quot; tag to existing rules, mainly in the FindBugs plugins.&lt;br /&gt;
&lt;br /&gt;
=== October 2014 ===&lt;br /&gt;
We've mapped the existing [http://jira.sonarsource.com/browse/RSPEC-2260?jql=project%20%3D%20RSPEC%20AND%20resolution%20%3D%20Unresolved%20AND%20type%20%3D%20Specification SonarQube rule specifications] to CWE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:sebastien.gioria@owasp.org Sebastien Gioria]&lt;br /&gt;
&lt;br /&gt;
[mailto:freddy.mallet@sonarsource.com Freddy Mallet]&lt;br /&gt;
&lt;br /&gt;
[mailto:ann.campbell@sonarsource.com G. Ann Campbell]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Open HUB ==&lt;br /&gt;
[https://www.openhub.net/p/sonar SonarQube rating on Open HUB]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
* 1 December 2014 : +20 rules relating to OWASP Top 10 and targeting Java already specified in the [http://jira.sonarsource.com/browse/RSPEC-1877?jql=labels%20%3D%20owasp-top10 SonarSource Rules Repository]&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How do I use the owasp-top10 tag? &lt;br /&gt;
: Perform a rule search for tag=owasp-top10. If you have the proper permissions, you can use the bulk change options to activate the results in your profiles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://www.advens.fr Advens ] ; French Experts on application security&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
SonarQube is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of June 2014, the priorities are:&lt;br /&gt;
&lt;br /&gt;
First deliver on Java langage :&lt;br /&gt;
&lt;br /&gt;
*Deliver tags mapping Cert Secure Coding and ISO 27034 ASC for the end of 2014 &lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping PCI-DSS requirements with the standard rules of SonarQube.&lt;br /&gt;
&lt;br /&gt;
*Deliver for 2015 rule tags mapping OWASP ASVS level (1,2,3,4).&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of SonarQube is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Freddy Mallet</name></author>	</entry>

	</feed>