{"id":11570,"date":"2025-03-23T08:58:00","date_gmt":"2025-03-23T06:58:00","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=11570"},"modified":"2025-03-27T08:53:56","modified_gmt":"2025-03-27T06:53:56","slug":"sonarqube-sca-advanced-security","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-sca-advanced-security\/","title":{"rendered":"\u05d7\u05d1\u05e8\u05ea Sonar \u05de\u05e8\u05d7\u05d9\u05d1\u05d4 \u05d0\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea SonarQube \u05d5\u05de\u05d5\u05e1\u05d9\u05e4\u05d4 \u05e1\u05e8\u05d9\u05e7\u05ea \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 (SCA)"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-1024x536.webp\" alt=\"\" class=\"wp-image-11584\" style=\"width:764px;height:auto\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-1024x536.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-300x157.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-768x402.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-1536x804.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2025\/03\/sonarqube_advanced_security-2048x1072.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\u05d1\u05d4\u05de\u05e9\u05da \u05dc\u05e8\u05db\u05d9\u05e9\u05d4 \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Tidelift \u05d1\u05d3\u05e6\u05de\u05d1\u05e8 2024, <br>\u05d4\u05d5\u05d3\u05d9\u05e2\u05d4 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d7\u05d1\u05e8\u05ea Sonar \u05e2\u05dc \u05d4\u05e8\u05d7\u05d1\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea SonarQube \u05db\u05da \u05e9\u05d9\u05db\u05dc\u05d5\u05dc \u05d2\u05dd \u05e1\u05e8\u05d9\u05e7\u05ea \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 (SCA), <br>\u05d5\u05d6\u05d0\u05ea \u05d1\u05e0\u05d5\u05e1\u05e3 \u05dc\u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05d4\u05d5\u05ea\u05d9\u05e7\u05d5\u05ea \u05e9\u05dc \u05e0\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 (SAST)&nbsp;\u05d4\u05d9\u05d3\u05d5\u05e2\u05d5\u05ea \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8.<\/h3>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">\u05d4\u05e8\u05db\u05d9\u05d1 \u05d4\u05d7\u05d3\u05e9 \u05d9\u05e7\u05e8\u05d0 &quot;SonarQube Advanced Security&quot;<br>\u05d5\u05d9\u05db\u05dc\u05d5\u05dc \u05d0\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05d4- Software Composition Analysis (SCA) \u05d4\u05d1\u05d0\u05d5\u05ea:<\/h4>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Vulnerability identification in third-party dependencies<\/strong> : \u05d6\u05d9\u05d4\u05d5\u05d9 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d1\u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05d5\u05e1\u05e4\u05e8\u05d9\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7. Sonar \u05d9\u05d0\u05e4\u05e9\u05e8 \u05d6\u05d9\u05d4\u05d5\u05d9, \u05de\u05e2\u05e7\u05d1 \u05d5\u05e0\u05d9\u05d4\u05d5\u05dc \u05e9\u05d5\u05d8\u05e3 \u05e9\u05dc \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05db\u05d0\u05dc\u05d4 (\u05db\u05d5\u05dc\u05dc CVEs ) \u05d1\u05e7\u05d5\u05d3 \u05e9\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d1\u05d0\u05e8\u05d2\u05d5\u05df.<br><\/li>\n\n\n\n<li><strong>License compliance : &nbsp;<\/strong>\u05d6\u05d9\u05d4\u05d5\u05d9 \u05d4\u05e8\u05d9\u05e9\u05d5\u05d9 \u05e9\u05dc \u05e1\u05e4\u05e8\u05d9\u05d5\u05ea \u05e6\u05d3 \u05d2' \u05e9\u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05e2\u05d5\u05e9\u05d4 \u05d1\u05d4\u05dd \u05e9\u05d9\u05de\u05d5\u05e9, \u05d5\u05d0\u05d9\u05de\u05d5\u05ea \u05e9\u05d9\u05de\u05d5\u05e9 \u05ea\u05e7\u05d9\u05df \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05de\u05d3\u05d9\u05e0\u05d9\u05d5\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea \u05dc\u05d2\u05d1\u05d9 \u05e1\u05d5\u05d2\u05d9 \u05e8\u05d9\u05e9\u05d5\u05d9 \u05de\u05d5\u05ea\u05e8\u05d9\u05dd.<br><\/li>\n\n\n\n<li><strong>\u05d9\u05e6\u05d5\u05e8 Software Bill of Materials (SBOMs) : &nbsp;<\/strong>\u05d9\u05d9\u05e6\u05d5\u05e8 \u05e8\u05e9\u05d9\u05de\u05ea \u05de\u05dc\u05d0\u05d9 \u05de\u05e4\u05d5\u05e8\u05d8\u05ea, \u05e9\u05ea\u05e2\u05d6\u05d5\u05e8 \u05dc\u05e6\u05d5\u05d5\u05ea\u05d9 \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05dc\u05d4\u05d1\u05d9\u05df, \u05dc\u05e0\u05d4\u05dc \u05d5\u05dc\u05d3\u05d5\u05d5\u05d7 \u05de\u05d0\u05d9\u05dc\u05d5 \u05e8\u05db\u05d9\u05d1\u05d9\u05dd \u05de\u05d5\u05e8\u05db\u05d1\u05d5\u05ea \u05d4\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d5\u05ea \u05e9\u05de\u05d9\u05d9\u05e6\u05e8 \u05d4\u05d0\u05e8\u05d2\u05d5\u05df.<br><\/li>\n\n\n\n<li><strong>Advanced SAST<\/strong> : \u05d6\u05d9\u05d4\u05d5\u05d9 \u05e9\u05dc \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05de\u05e1\u05ea\u05ea\u05e8\u05d5\u05ea \u05d1\u05e2\u05d5\u05de\u05e7 \u05d4\u05e7\u05d5\u05d3 \u05d5\u05de\u05ea\u05e7\u05e9\u05e8\u05d5\u05ea \u05e2\u05dd \u05e1\u05e4\u05e8\u05d9\u05d5\u05ea \u05e6\u05d3 \u05d2'.<\/li>\n<\/ol>\n\n\n\n<p>\u05db\u05dc \u05d0\u05dc\u05d4 \u05de\u05ea\u05d5\u05d5\u05e1\u05e4\u05d9\u05dd \u05dc\u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05d4- SAST &nbsp;\u05d4\u05d5\u05ea\u05d9\u05e7\u05d5\u05ea \u05e9\u05d1\u05de\u05d5\u05e6\u05e8, \u05d4\u05db\u05d5\u05dc\u05dc\u05d5\u05ea \u05e1\u05e8\u05d9\u05e7\u05d4 \u05e9\u05dc \u05d0\u05dc\u05e4\u05d9 \u05d7\u05d5\u05e7\u05d9\u05dd <br>\u05e2\u05d1\u05d5\u05e8 \u05dc\u05de\u05e2\u05dc\u05d4 \u05de-30 \u05e9\u05e4\u05d5\u05ea \u05d5- frameworks, \u05d5\u05db\u05d5\u05dc\u05dc\u05d5\u05ea \u05d2\u05dd: <br>\u05d6\u05d9\u05d4\u05d5\u05d9 \u05e1\u05d5\u05d3\u05d5\u05ea, Taint analysis , \u05d3\u05d5&quot;\u05d7\u05d5\u05ea Security \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05e1\u05d8\u05e0\u05d3\u05e8\u05d8\u05d9\u05dd \u05db\u05d2\u05d5\u05df OWASP, CWE, MISRA \u05d5\u05e2\u05d5\u05d3.<\/p>\n\n\n\n<p>\u05d4\u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05d4\u05d7\u05d3\u05e9\u05d5\u05ea \u05d9\u05ea\u05d5\u05d5\u05e1\u05e4\u05d5 \u05dc\u05de\u05d5\u05e6\u05e8 \u05d1\u05e2\u05d5\u05d3 \u05db\u05d7\u05d5\u05d3\u05e9, \u05d5\u05e0\u05d9\u05ea\u05df \u05db\u05d1\u05e8 \u05dc\u05e7\u05d1\u05dc \u05de\u05d0\u05d9\u05ea\u05e0\u05d5 \u05de\u05d7\u05d9\u05e8\u05d9\u05dd \u05d5\u05d4\u05e6\u05e2\u05d5\u05ea \u05de\u05d7\u05d9\u05e8 \u05db\u05e2\u05ea.<\/p>\n\n\n\n<div style=\"height:9px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-background\" style=\"background-color:#cff5ff\"><em>\u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5: &nbsp;<a href=\"mailto:sonar@almtoolbox.com\" target=\"_blank\" rel=\"noreferrer noopener\">sonar@almtoolbox.com<\/a>  \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea: 072-240-5222<br>(\u05d0\u05e0\u05d5 \u05d4\u05de\u05e9\u05d5\u05d5\u05e7\u05d9\u05dd \u05d4\u05e8\u05e9\u05de\u05d9\u05d9\u05dd \u05d4\u05d9\u05d7\u05d9\u05d3\u05d9\u05dd \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8 \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc, \u05e7\u05e4\u05e8\u05d9\u05e1\u05d9\u05df \u05d5\u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea)<\/em><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\">\u05e1\u05e8\u05d8\u05d5\u05df \u05d4\u05d3\u05d2\u05de\u05d4 \u05e9\u05dc \u05d4\u05e8\u05db\u05d9\u05d1 \u05d4\u05d7\u05d3\u05e9:<\/h3>\n\n\n\n<p>\u05de\u05e9\u05da \u05d4\u05e1\u05e8\u05d8\u05d5\u05df \u05db-7 \u05d3\u05e7\u05d5\u05ea. \u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea \u05d5\u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05e2\u05dc \u05e6\u05d9\u05e8 \u05d4\u05d6\u05de\u05df \u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd.<\/p>\n\n\n\n<div style=\"padding:57% 0 0 0;position:relative;\"><iframe src=\"https:\/\/player.vimeo.com\/video\/1069846975?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media\" style=\"position:absolute;top:0;left:0;width:100%;height:100%;\" title=\"Tidelift Demo: Remove risks to your organization from bad open source packages\"><\/iframe><\/div><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script>\n\n\n\n<div style=\"height:9px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>0:00 \u05e8\u05e7\u05e2 \u05d5\u05e1\u05e7\u05d9\u05e8\u05d4<\/li>\n\n\n\n<li>2:00 \u05d4\u05d3\u05d2\u05de\u05d4 &#8211; \u05d0\u05d9\u05da \u05dc\u05d4\u05e2\u05e8\u05d9\u05da \u05e1\u05e4\u05e8\u05d9\u05d9\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 \u05e9\u05e9\u05d5\u05e7\u05dc\u05d9\u05dd \u05dc\u05d4\u05e9\u05ea\u05de\u05e9 \u05d1\u05d4 \u05dc\u05e4\u05d9\u05ea\u05d5\u05d7 \u05e9\u05dc\u05e0\u05d5. \u05d4\u05d4\u05d3\u05d2\u05de\u05d4 \u05e2\u05dc \u05e1\u05e4\u05e8\u05d9\u05d9\u05ea urllib3 (\u05e1\u05e4\u05e8\u05d9\u05d4 \u05e0\u05e4\u05d5\u05e6\u05d4 \u05d1- Python)<\/li>\n\n\n\n<li>3:00 \u05d4\u05d3\u05d2\u05de\u05d4 \u05d8\u05db\u05e0\u05d9\u05ea &#8211; API view (\u05d1\u05e2\u05d6\u05e8\u05ea Postman)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d5\u05d5\u05e0\u05d8\u05d9\u05dd:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.almtoolbox.com\/il\/sonarqube\" target=\"_blank\" rel=\"noreferrer noopener\">\u05d0\u05ea\u05e8 SonarQube \u05d9\u05e9\u05e8\u05d0\u05dc (\u05e2\u05d1\u05e8\u05d9\u05ea)<\/a> \u05e2\u05dd \u05ea\u05db\u05e0\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd<\/li>\n\n\n\n<li><a href=\"https:\/\/www.almtoolbox.com\/sonarqube\" target=\"_blank\" rel=\"noreferrer noopener\">\u05d0\u05ea\u05e8 SonarQube<\/a> \u05e9\u05dc\u05e0\u05d5 \u05d1\u05d0\u05e0\u05d2\u05dc\u05d9\u05ea<\/li>\n\n\n\n<li><a href=\"https:\/\/tidelift.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u05d4\u05d4\u05d5\u05d3\u05e2\u05d4 \u05e2\u05dc \u05e8\u05db\u05d9\u05e9\u05ea Tidelift<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SonarQube \u05de\u05d5\u05e1\u05d9\u05e4\u05d4 \u05e1\u05e8\u05d9\u05e7\u05ea \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 (SCA),  \u05d5\u05d6\u05d0\u05ea \u05d1\u05e0\u05d5\u05e1\u05e3 \u05dc\u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05d4-SAST  \u05d4\u05d5\u05ea\u05d9\u05e7\u05d5\u05ea \u05e9\u05d1\u05de\u05d5\u05e6\u05e8, \u05d4\u05db\u05d5\u05dc\u05dc\u05d5\u05ea \u05e1\u05e8\u05d9\u05e7\u05d4 \u05e9\u05dc \u05d0\u05dc\u05e4\u05d9 \u05d7\u05d5\u05e7\u05d9\u05dd \u05e2\u05d1\u05d5\u05e8 \u05dc\u05de\u05e2\u05dc\u05d4 \u05de-30 \u05e9\u05e4\u05d5\u05ea<\/p>\n","protected":false},"author":5,"featured_media":11584,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[367,43],"tags":[687,338,575,922],"class_list":["post-11570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sonarqube","category-static-code-analysis","tag-owasp","tag-sast","tag-sca","tag-sonarqube-advanced-security"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/11570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=11570"}],"version-history":[{"count":21,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/11570\/revisions"}],"predecessor-version":[{"id":11617,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/11570\/revisions\/11617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/11584"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=11570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=11570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=11570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}