<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=VinodA</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=VinodA"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/VinodA"/>
		<updated>2026-05-06T15:03:34Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244714</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244714"/>
				<updated>2018-10-29T23:20:14Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
'''Docker:''' https://hub.docker.com/r/owasp/sonarqube/&lt;br /&gt;
&lt;br /&gt;
'''GitHub:''' https://github.com/OWASP/sonarqube&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.gnu.org/licenses/lgpl-3.0.txt LGPL v3]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/spotbugs/sonar-findbugs SonarFindBugs] &lt;br /&gt;
* [https://github.com/VinodAnandan/sonar-pitest SonarPitest] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java SonarJava] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript SonarJavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php SonarPHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
== 2019 Roadmap ==&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244713</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244713"/>
				<updated>2018-10-29T23:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
https://hub.docker.com/r/owasp/sonarqube/&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/sonarqube&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.gnu.org/licenses/lgpl-3.0.txt LGPL v3]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/spotbugs/sonar-findbugs SonarFindBugs] &lt;br /&gt;
* [https://github.com/VinodAnandan/sonar-pitest SonarPitest] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java SonarJava] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript SonarJavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php SonarPHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
== 2019 Roadmap ==&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_SonarQube_Page&amp;diff=244696</id>
		<title>Projects/OWASP SonarQube Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_SonarQube_Page&amp;diff=244696"/>
				<updated>2018-10-28T21:12:00Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: LGPL v3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Project About&lt;br /&gt;
| project_name =OWASP SonarQube Project &lt;br /&gt;
| project_description =The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
| project_license =LGPL v3&lt;br /&gt;
| leader_name1 = Vinod Anandan&lt;br /&gt;
| leader_email1 =vinod@owasp.org&lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| mailing_list_name = owasp_sonarqube@lists.owasp.org&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244695</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=244695"/>
				<updated>2018-10-28T21:10:52Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: /* Main */  LGPL v3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.gnu.org/licenses/lgpl-3.0.txt LGPL v3]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/spotbugs/sonar-findbugs SonarFindBugs] &lt;br /&gt;
* [https://github.com/VinodAnandan/sonar-pitest SonarPitest] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java SonarJava] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript SonarJavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php SonarPHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
== 2019 Roadmap ==&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=243513</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=243513"/>
				<updated>2018-09-18T14:45:24Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/spotbugs/sonar-findbugs SonarFindBugs] &lt;br /&gt;
* [https://github.com/VinodAnandan/sonar-pitest SonarPitest] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java SonarJava] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript SonarJavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php SonarPHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
== 2019 Roadmap ==&lt;br /&gt;
* Documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=232766</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=232766"/>
				<updated>2017-08-31T16:24:18Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: OWASP SonarQube Project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Source code analysis tools, also referred to as Static Application Security Testing (SAST) Tools, are designed to analyze source code and/or compiled versions of code to help find security flaws. Ideally, such tools would automatically find security flaws with such a high degree of confidence that what's found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that just automatically finds flaws. If you are interested in the effectiveness of SAST tools, check out the OWASP [[Benchmark]] project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including SAST.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development life cycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful, especially when compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
== Strengths and Weaknesses ==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
&lt;br /&gt;
* Scales well -- can be run on lots of software, and can be run repeatedly (as with nightly builds or continuous integration)&lt;br /&gt;
* Useful for things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, and so forth&lt;br /&gt;
* Output is good for developers -- highlights the precise source files, line numbers, and even subsections of lines that are affected&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. However, tools of this type are getting better.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your programming language, but not usually a key factor once it does.&lt;br /&gt;
* Types of vulnerabilities it can detect (out of the [[OWASP Top Ten]]?) (plus more?)&lt;br /&gt;
* How accurate is it? False Positive/False Negative rates?&lt;br /&gt;
** Does the tool have an OWASP [[Benchmark]] score?&lt;br /&gt;
* Does it understand the libraries/frameworks you use?&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* How hard is it to setup/use?&lt;br /&gt;
* Can it be run continuously and automatically?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP SonarQube Project]]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
&lt;br /&gt;
==Disclaimer==&lt;br /&gt;
&lt;br /&gt;
Disclaimer: &amp;lt;b&amp;gt;The tools listed in the tables below are presented in alphabetical order. &amp;lt;i&amp;gt;OWASP does not endorse any of the vendors or tools by listing them in the table below.&amp;lt;/i&amp;gt; We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think that this information is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.openstack.org/wiki/Security/Projects/Bandit Bandit] - bandit is a comprehensive source vulnerability scanner for Python&lt;br /&gt;
* [http://brakemanscanner.org/ Brakeman] - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications&lt;br /&gt;
* [http://rubygems.org/gems/codesake-dawn Codesake Dawn] - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby&lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - Find Bugs (including a few security flaws) in Java programs&lt;br /&gt;
* [https://find-sec-bugs.github.io/ FindSecBugs] - A security specific plugin for FingBugs that significantly improves FindBug's ability to find security vulnerabilities in Java programs&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity] - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.'' &lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.&lt;br /&gt;
* [https://pumascan.com/ Puma Scan] - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.&lt;br /&gt;
* [https://dotnet-security-guard.github.io/ .NET Security Guard] - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.&lt;br /&gt;
* [http://sourceforge.net/projects/rips-scanner/ RIPS] - RIPS is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the sourceforge.net site.&lt;br /&gt;
* [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit] - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks.  It currently has core PHP rules as well as Drupal 7 specific rules.&lt;br /&gt;
* [http://www.sonarqube.org/ SonarQube] - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by [http://www.sonarlint.org/ SonarLint].&lt;br /&gt;
* [http://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper (VCG)] - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.&lt;br /&gt;
* [http://www.xanitizer.net Xanitizer] - Scans Java for security vulnerabilities, mainly via taint analysis. The tool comes with a number of predefined vulnerability detectors which can additionally be extended by the user.&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www-01.ibm.com/software/rational/products/appscan/source/ AppScan Source] (IBM)&lt;br /&gt;
* [http://www.blueclosure.com BlueClosure BC Detect] (BlueClosure)&lt;br /&gt;
* [https://buguroo.com/products/bugblast-next-gen-appsec-platform/bugscout-sca bugScout] (Buguroo Offensive Security) Latest generation source code analysis tool bugScout detects source code vulnerabilities and makes possible an accurate management of the life cycles due to its easy use.&lt;br /&gt;
* [http://www.castsoftware.com/solutions/application-security/cwe#SupportedSecurityStandards CAST AIP] (CAST) Performs static and architectural analysis to check for: SQL Injection, Cross Site Scripting (XSS), Input Validation,  Insecure Cryptographic Storage, Information Leakage and Improper Error Handling, Data Access, API Abuse, Encapsulation on over 30 languages.&lt;br /&gt;
* [https://www.codacy.com/ Codacy] is free for open source projects, and integrates with tools such as Brakeman, Bandit, FindBugs, and a number of others. It offers security patterns for languages such as Python, Ruby, Scala, Java, Javascript and more.&lt;br /&gt;
* [http://www.contrastsecurity.com/ Contrast from Contrast Security] Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.coverity.com/products/code-advisor/ Coverity Code Advisor] (Synopsys)&lt;br /&gt;
* [https://www.checkmarx.com/technology/static-code-analysis-sca/ CxSAST] (Checkmarx)&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/static-code-analysis-sast/ Fortify] (HP)&lt;br /&gt;
* [http://www.juliasoft.com/solutions Julia] - SaaS Java static analysis (JuliaSoft)&lt;br /&gt;
* [http://www.klocwork.com/capabilities/static-code-analysis KlocWork] (KlocWork)&lt;br /&gt;
* [https://www.kiuwan.com/code-analysis/ Kiuwan] - SaaS Software Quality &amp;amp; Security Analysis (an [http://www.optimyth.com Optimyth] company)&lt;br /&gt;
* [http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547 Parasoft Test] (Parasoft)&lt;br /&gt;
* [http://www.viva64.com/en/ PVS-Studio] (PVS-Studio) For C/C++, C#&lt;br /&gt;
* [https://www.whitehatsec.com/products/static-application-security-testing/ Sentinel Source] (Whitehat)&lt;br /&gt;
* [https://www.synopsys.com/software-integrity/products/interactive-application-security-testing.html Seeker] (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis with simulated attacks. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.sourcepatrol.co.uk/ Source Patrol] (Pentest)&lt;br /&gt;
* [http://www.veracode.com/products/binary-static-analysis-sast Veracode Static Analysis] (Veracode)&lt;br /&gt;
&lt;br /&gt;
==More info==&lt;br /&gt;
&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
* [[:Category:Vulnerability_Scanning_Tools | DAST Tools]] - Similar info on Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
[[Category:SAMM-CR-2]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_SonarQube_Page&amp;diff=232477</id>
		<title>Projects/OWASP SonarQube Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_SonarQube_Page&amp;diff=232477"/>
				<updated>2017-08-21T06:58:53Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Project About&lt;br /&gt;
| project_name =OWASP SonarQube Project &lt;br /&gt;
| project_description =The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
| project_license =Apache 2.0 license&lt;br /&gt;
| leader_name1 = Vinod Anandan&lt;br /&gt;
| leader_email1 =vinod@owasp.org&lt;br /&gt;
| leader_username1 = &lt;br /&gt;
| mailing_list_name = owasp_sonarqube@lists.owasp.org&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232453</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232453"/>
				<updated>2017-08-18T11:35:06Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232139</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232139"/>
				<updated>2017-08-09T21:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular continuous code quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232138</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232138"/>
				<updated>2017-08-09T21:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The OWASP SonarQube project aims to provide open source SAST using the existing open source solutions. SonarQube is one of the world’s most popular Continuous Code Quality tools and it's actively used by many developers and companies.&lt;br /&gt;
&lt;br /&gt;
This project aims to enable more security functionalities to SonarQube and use it as an SAST. This project will use open source sonar plugins, rules, as well as other open source plugins especially FindSecBugs and its security rules. FindSecBugs enables the taint analysis.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project.&lt;br /&gt;
* [https://github.com/SonarSource/sonarqube SonarQube] &lt;br /&gt;
* [https://github.com/find-sec-bugs/find-sec-bugs FindSecBugs] &lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232059</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232059"/>
				<updated>2017-08-07T22:05:04Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' If you are interested in contributing to open source static vulnerability analysis for Java, OWASP recommends you contribute to the [http://find-sec-bugs.github.io/ Find Security Bugs Project] run by Philippe Arteau. FindSecBugs is a FindBugs plugin. Philippe also runs the [https://github.com/SonarQubeCommunity/sonar-findbugs SonarQube FindBugs Plugin Project], which bundles both FindBugs and FindSecBugs into a plugin that can be used with SonarQube and in fact comes bundled with SonarQube by default. So, by contributing to the Find Security Bugs project, you are helping both the Find Bugs and SonarQube user communities at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarSource/sonar-dotnet-codeanalysis C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232058</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232058"/>
				<updated>2017-08-07T22:03:50Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' If you are interested in contributing to open source static vulnerability analysis for Java, OWASP recommends you contribute to the [http://find-sec-bugs.github.io/ Find Security Bugs Project] run by Philippe Arteau. FindSecBugs is a FindBugs plugin. Philippe also runs the [https://github.com/SonarQubeCommunity/sonar-findbugs SonarQube FindBugs Plugin Project], which bundles both FindBugs and FindSecBugs into a plugin that can be used with SonarQube and in fact comes bundled with SonarQube by default. So, by contributing to the Find Security Bugs project, you are helping both the Find Bugs and SonarQube user communities at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarSource/sonar-dotnet-codeanalysis C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232057</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232057"/>
				<updated>2017-08-07T22:02:34Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' If you are interested in contributing to open source static vulnerability analysis for Java, OWASP recommends you contribute to the [http://find-sec-bugs.github.io/ Find Security Bugs Project] run by Philippe Arteau. FindSecBugs is a FindBugs plugin. Philippe also runs the [https://github.com/SonarQubeCommunity/sonar-findbugs SonarQube FindBugs Plugin Project], which bundles both FindBugs and FindSecBugs into a plugin that can be used with SonarQube and in fact comes bundled with SonarQube by default. So, by contributing to the Find Security Bugs project, you are helping both the Find Bugs and SonarQube user communities at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarSource/sonar-dotnet-codeanalysis C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232056</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232056"/>
				<updated>2017-08-07T22:01:18Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' If you are interested in contributing to open source static vulnerability analysis for Java, OWASP recommends you contribute to the [http://find-sec-bugs.github.io/ Find Security Bugs Project] run by Philippe Arteau. FindSecBugs is a FindBugs plugin. Philippe also runs the [https://github.com/SonarQubeCommunity/sonar-findbugs SonarQube FindBugs Plugin Project], which bundles both FindBugs and FindSecBugs into a plugin that can be used with SonarQube and in fact comes bundled with SonarQube by default. So, by contributing to the Find Security Bugs project, you are helping both the Find Bugs and SonarQube user communities at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Historical Info:&lt;br /&gt;
&lt;br /&gt;
....&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy:&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://groups.google.com/forum/#!forum/sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
* To suggest a rule, send as much as possible from the following list:&lt;br /&gt;
** description - What should be done/not done, and why&lt;br /&gt;
** noncompliant code example in the language of your choice&lt;br /&gt;
** remediation action - This can be as simple as &amp;quot;Don't do X.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarSource/sonar-dotnet-codeanalysis C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232047</id>
		<title>OWASP SonarQube Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_SonarQube_Project&amp;diff=232047"/>
				<updated>2017-08-07T14:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;VinodA: New project leader&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' If you are interested in contributing to open source static vulnerability analysis for Java, OWASP recommends you contribute to the [http://find-sec-bugs.github.io/ Find Security Bugs Project] run by Philippe Arteau. FindSecBugs is a FindBugs plugin. Philippe also runs the [https://github.com/SonarQubeCommunity/sonar-findbugs SonarQube FindBugs Plugin Project], which bundles both FindBugs and FindSecBugs into a plugin that can be used with SonarQube and in fact comes bundled with SonarQube by default. So, by contributing to the Find Security Bugs project, you are helping both the Find Bugs and SonarQube user communities at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Historical Info:&lt;br /&gt;
&lt;br /&gt;
The first goal of the OWASP SonarQube Project is to a create a referential of check specifications targeting OWASP vulnerabilities and that can be detected by SAST tools (Static Application Security Testing). From there, the second goal is to provide a reference implementations of most of those checks in the Open Source SonarQube language analysers (Java, JavaScript, PHP and C#).&lt;br /&gt;
&lt;br /&gt;
Any contributor is highly welcome to participate to this community effort and participating is pretty easy:&lt;br /&gt;
* Each idea of a new potential valuable check should be sent to this [https://groups.google.com/forum/#!forum/sonarqube project mailing list].&lt;br /&gt;
* Then some discussions might start to challenge the idea&lt;br /&gt;
* At the end of discussions, a specification of the check is created in the following JIRA project by one of the leader of this project : [http://jira.sonarsource.com/issues/?jql=project%20%3D%20RSPEC%20AND%20issuetype%20%3D%20Specification%20AND%20labels%20%3D%20owasp-top10 http://jira.sonarsource.com/browse/RSPEC].&lt;br /&gt;
* To suggest a rule, send as much as possible from the following list:&lt;br /&gt;
** description - What should be done/not done, and why&lt;br /&gt;
** noncompliant code example in the language of your choice&lt;br /&gt;
** remediation action - This can be as simple as &amp;quot;Don't do X.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;News&amp;quot; is updated as soon as :&lt;br /&gt;
* A check specification is created&lt;br /&gt;
* A SonarQube analysers containing some stuff relating to this OWASP SonarQube project is released. &lt;br /&gt;
&lt;br /&gt;
==About SonarQube==&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarqube.org SonarQube] is an Open Source platform for managing code quality. This platform can be extended with Open Source or commercial plugins, see for instance the [http://redirect.sonarsource.com/plugins/java.html Java], [http://redirect.sonarsource.com/plugins/javascript.html JavaScript], [http://redirect.sonarsource.com/plugins/php.html PHP] and [http://redirect.sonarsource.com/plugins/csharp.html C#] plugins.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP SonarQube Project is free to use. It is licensed under the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:vinod@owasp.org Vinod Anandan]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_sonarqube Sign Up!]&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/pipermail/owasp_sonarqube/ Archives]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Repository == &lt;br /&gt;
Here are the repositories for the open source plugins related to this project. Most of them provide security-related rules:&lt;br /&gt;
* [https://github.com/SonarSource/sonar-java Java] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-javascript JavaScript] &lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-php PHP]&lt;br /&gt;
* [https://github.com/SonarSource/sonar-dotnet-codeanalysis C#]&lt;br /&gt;
* [https://github.com/SonarCommunity/sonar-widget-lab Widget Lab] provides security-related SonarQube dashboard widgets&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
* 26 Mar 2016: Release of the [https://jira.sonarsource.com/jira/secure/ReleaseNote.jspa?projectId=10935&amp;amp;version=12970 SonarQube C# plugin version 5.0] adds four new bug and security-related rules:&lt;br /&gt;
** [http://www.sonarlint.org/visualstudio/rules/index.html#version=1.9.0&amp;amp;ruleId=S1944 S1944] Inappropriate casts should not be made&lt;br /&gt;
** [http://www.sonarlint.org/visualstudio/rules/index.html#version=1.9.0&amp;amp;ruleId=S3466 S3466] Optional parameters should be passed to &amp;quot;base&amp;quot; calls&lt;br /&gt;
** [http://www.sonarlint.org/visualstudio/rules/index.html#version=1.9.0&amp;amp;ruleId=S3449 S3449] Right operands of shift operators should be integers&lt;br /&gt;
** [http://www.sonarlint.org/visualstudio/rules/index.html#version=1.8.0&amp;amp;ruleId=S2184 S2184] Result of integer division should not be assigned to floating point variable&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 25 Mar 2016: Release of the [https://jira.sonarsource.com/jira/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=12948 SonarQube Java plugin version 3.12] adds three new bug and security-related rules:&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3066 S3066] &amp;quot;enum&amp;quot; fields should not be publicly mutable&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3034 S3034] Raw byte values should not be used in bitwise operations in combination with shifts&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3546 S3546] Resources as defined by user should be closed&lt;br /&gt;
This last is actually a rule template, which will allow users to raise issues appropriately on their custom Resources.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 6 Feb 2016: Release of the [https://jira.sonarsource.com/jira/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=12876 SonarQube Java plugin version 3.10] adds seven new bug and security-related rules:&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS2142 S2142] &amp;quot;InterruptedException&amp;quot; should not be ignored&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3438 S3438] &amp;quot;SingleConnectionFactory&amp;quot; instances should be set to &amp;quot;reconnectOnException&amp;quot;&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3281 S3281] Default EJB interceptors should be declared in &amp;quot;ejb-jar.xml&amp;quot;&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS2639 S2639] Inappropriate regular expressions should not be used&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3369 S3369] Security constraints should be defired&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3374 S3374] Struts validation forms should have unique names&lt;br /&gt;
** [https://nemo.sonarqube.org/coding_rules#rule_key=squid%3AS3355 S3355] Web applications should use validation filters&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 13 Jan 2016: Release of the [https://jira.sonarsource.com/jira/secure/ReleaseNote.jspa?projectId=10933&amp;amp;version=12847 SonarQube JavaScript plugin version 2.10] adds four new bug detection rules:&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2234 RSPEC-2234] Parameters should be passed in the correct order]&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-3001 RSPEC-3001] &amp;quot;delete&amp;quot;should be used only with objects&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2681 RSPEC-2681] Multiline blocks should be enclosed in curly braces&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-3403 RSPEC-3403] The identity operator (&amp;quot;===&amp;quot;) should not be used with dissimilar types&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 12 Nov 2015: Release of the [https://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10956&amp;amp;version=12425 SonarQube PHP plugin version 2.7] adds three new bug detection rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 7 Oct 2015: Release of the [https://jira.sonarsource.com/jira/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=12521 SonarQube Java plugin version 3.6] adds 14 new rules including four related to CWE or security:&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2653 RSPEC-2653] Web applications should have a &amp;quot;main&amp;quot; method&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2221 RSPEC-2221] &amp;quot;Exception&amp;quot; should not be caught when not required by called methods&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-3318 RSPEC-3318] Untrusted data should not be stored in sessions&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-1854 RSPEC-1845] Dead stores should be removed&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 2 Sept 2015: Release of [http://www.sonarsource.com/2015/09/02/sonarqube-javascript-2-8-released/ the SonarQube JavaScript plugin version 2.8] improves several rules and adds 5 new rules, all related to bugs or security, including:&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-905 RSPEC-905] Non-empty statements should change control flow or have at least one side effect&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-3271 RSPEC-3271] Local storage should not be used&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2611 RSPEC-2611] Untrusted content should not be included&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* 25 Aug 2015: Release of [http://www.sonarsource.com/2015/08/25/sonarqube-java-3-5-released/ the SonarQube Java plugin version 3.5] improves a number of existing rules, and adds 6 new rules, including 2 security-related rules:&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2658 RSPEC-2384] Classes should not be loaded dynamically&lt;br /&gt;
** [https://jira.sonarsource.com/browse/RSPEC-2386 RSPEC-2386] Mutable fields should not be &amp;quot;public static&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* 9 July 2015: Release of [http://www.sonarsource.com/2015/07/08/sonarqube-java-3-4-released/ the SonarQube Java plugin version 3.4] adds 17 new rules, including 2 security-related rules:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2384 RSPEC-2384] Mutable members should not be stored or returned directly&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2976 RSPEC-2976] &amp;quot;File.createTempFile&amp;quot; should not be used to create a directory&lt;br /&gt;
&lt;br /&gt;
* 1 July 2015: Release of [http://www.sonarsource.com/2015/06/30/sonarqube-javascript-2-7-released/ the SonarQube JavaScript plugin version 2.7] adds 6 new rules, including 2 bug-related rules, 1 CWE-related rule, and 2 rules directly related to security&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-930 RSPEC-930] The number of arguments passed to a function shall match the number of parameters&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2819 RSPEC-2819] Cross-document messaging domains should be carefully restricted&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2817 RSPEC-2817] Web SQL databases shoudl not be used&lt;br /&gt;
&lt;br /&gt;
* 9 June 2015: Release of [http://www.sonarsource.com/2015/06/08/sonarqube-php-2-6-released/ the SonarQube PHP plugin version 2.6] adds 5 new rules, including 1 CWE-related rule:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2068 RSPEC-2068] Credentials should not be hard-coded&lt;br /&gt;
&lt;br /&gt;
* 19 May 2015: Release of [http://www.sonarsource.com/2015/05/19/sonarqube-java-3-3-released/ the SonarQube Java plugin version 3.3] adds 7 new rules, including 4 related to bug detection.&lt;br /&gt;
&lt;br /&gt;
* 19 May 2015: Release of [http://www.sonarsource.com/2015/05/19/sonarqube-php-2-5-released/ the SonarQube PHP plugin version 2.5] adds 7 new rules, including 5 related to bug detection and error handling.&lt;br /&gt;
&lt;br /&gt;
* 30 April 2015: Release of [http://www.sonarsource.com/2015/04/30/sonarqube-java-3-2-released/ the SonarQube Java plugin version 3.2] adds a rule to find unclosed resources, which can help prevent DoS attacks.&lt;br /&gt;
&lt;br /&gt;
* 23 April 2015: Release of [http://www.sonarsource.com/2015/04/23/sonarqube-javascript-2-5-released/ the SonarQube JavaScript plugin version 2.5] adds 13 new rules, including seven related to bug or pitfall detection, including&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-1854 RSPEC 1854] Dead stores should be removed&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-888 RSPEC-888] Equality operators should not be used in &amp;quot;for&amp;quot; loop termination conditions&lt;br /&gt;
&lt;br /&gt;
* 3 April 2015: Release of [http://www.sonarsource.com/2015/04/03/sonarqube-java-3-1-released/ the SonarQube Java plugin version 3.1] adds seven new rules related to bug detection, including a powerful new rule able to detect null pointer dereferences.&lt;br /&gt;
&lt;br /&gt;
* 2 April 2015: Release of [http://www.sonarsource.com/2015/04/02/sonarqube-javascript-2-4-released/ the SonarQube JavaScript plugin version 2.4] adds 15 new rules related to bug detection, including one which is also related to security:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2228 RSPEC-2228] Console logging should not be used&lt;br /&gt;
&lt;br /&gt;
* 9 March 2015: With its latest release, version 3.0 on 4 March 2015, the SonarQube Java plugin now covers 50 different CWE items. [http://dist.sonarsource.com/reports/coverage/squid_cwe_coverage.html See the full list]&lt;br /&gt;
&lt;br /&gt;
* 4 March 2015: Release of [http://www.sonarsource.com/2015/03/04/sonarqube-java-3-0-released/ SonarQube Java 3.0 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11895 24 new rules], including 14 related to bug detection and 6 related to the detection of multi-threading issues.&lt;br /&gt;
&lt;br /&gt;
* 5 February 2015: Release of [http://www.sonarsource.com/2015/02/05/sonarqube-java-2-9-1-released/ SonarQube Java 2.9.1 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11894 19 new rules] including 1 related to OWASP Top 10:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2257 RSPEC-2257] Only standard cryptographic algorithms should be used&lt;br /&gt;
&lt;br /&gt;
* 5 January 2015: Release of [http://www.sonarsource.com/2015/01/09/sonarqube-java-2-8-released/ SonarQube Java 2.8 plugin] containing [http://jira.sonarsource.com/secure/ReleaseNote.jspa?projectId=10973&amp;amp;version=11893 25 new rules] including several related to OWASP Top 10:&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2277 RSPEC-2277] Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2078 RSPEC-2078] Values passed to LDAP queries should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2076 RSPEC-2076] Values passed to OS commands should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2278 RSPEC-2278] DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
&lt;br /&gt;
* 12 December 20014 : Release of [http://www.sonarsource.com/2014/12/11/sonarqube-java-2-7-released/ SonarQube Java 2.7 plugin] containing [http://jira.sonarsource.com/browse/SONARJAVA/fixforversion/11892 26 new rules] and 7 relating to OWASP TOP 10&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2068 RSPEC-2068] Credentials should not be hard-coded&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2245 RSPEC-2245] Pseudorandom number generators (PRNGs) should not be used in secure context&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255] Cookies should not be used to store sensitive information&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089] HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2070 RSPEC-2070] SHA-1 and MD5 hash algorithms should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254] &amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258] &amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
&lt;br /&gt;
* 10 December 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2278 RSPEC-2278] DES (Data Encryption Standard) and DESede (3DES) should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2277 RSPEC-2277] Cryptographic RSA algorithms should always incorporate OAEP (Optimal Asymmetric Encryption Padding)&lt;br /&gt;
&lt;br /&gt;
* 3 December 2014 : 4 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2258 RSPEC-2258]	&amp;quot;javax.crypto.NullCipher&amp;quot; should not be used for anything other than testing&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2257 RSPEC-2257]	Only standard cryptographic algorithms should be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2255 RSPEC-2255]	Cookies should not be used to store sensitive information&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2254 RSPEC-2254]	&amp;quot;HttpServletRequest.getRequestedSessionId()&amp;quot; should not be used&lt;br /&gt;
&lt;br /&gt;
* 6 November 2014 : [http://fr.slideshare.net/Eagle42/analyser-la-scurit-de-son-code-source-avec-sonarsource Project presentation at Application Security Forum West Switzerland]  &lt;br /&gt;
&lt;br /&gt;
* 1 November 2014 : new &amp;quot;owasp-top10&amp;quot; tag in the &amp;quot;Rules&amp;quot; space to quickly search for OWASP Top 10 relating rules (mainly Findbugs rules)&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2077 RSPEC-2077]	Values passed to SQL commands should be sanitized&lt;br /&gt;
&lt;br /&gt;
* 2 October 2014 : 2 new rules specified&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2092 RSPEC-2092]	Cookies should be &amp;quot;secure&amp;quot;&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2091 RSPEC-2091]	Values passed to XPath expressions should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2089 RSPEC-2089]	HTTP referers should not be relied on&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2087 RSPEC-2087]	Weak encryption should not be used&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2086 RSPEC-2086]	Values passed to XQuery commands should be sanitized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2085 RSPEC-2085]	Values passed to HTTP redirects should be neutralized&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2084 RSPEC-2084]	Messages output from a servlet &amp;quot;catch&amp;quot; block should be invariable&lt;br /&gt;
** [http://jira.sonarsource.com/browse/RSPEC-2083 RSPEC-2083]	Values used in path traversal should be neutralized&lt;br /&gt;
&lt;br /&gt;
* 1 October 2014 : Matching most of the SonarQube rules to the MITRE CWE referential to ease the tagging of &amp;quot;owasp-top10&amp;quot; relating rules&lt;br /&gt;
&lt;br /&gt;
* 11 September 2014 : Project as been presented at OWASP France Meeting. See [https://air.mozilla.org/owasp-france-meeting-mozilla-paris-2/ Air Mozilla recording ]&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; How to help ? &lt;br /&gt;
: Give us  your expertise on some langage, or ability to test on some real project our rules, or more...&lt;br /&gt;
&lt;br /&gt;
; Will you plan other langage ? &lt;br /&gt;
: Yes, contact us if you want to know more. And perhaps give us some feedback one some real projects....&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
== Sponsors : ==&lt;br /&gt;
&lt;br /&gt;
[http://coach.appsec.fr AppSec Blog] ; AppSecFR Coach - Sébastien Gioria Consulting&lt;br /&gt;
&lt;br /&gt;
[http://www.sonarsource.com SonarSource] ; Founder and maintainer of SonarQube&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_SonarQube_Page}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>VinodA</name></author>	</entry>

	</feed>