{"id":7451,"date":"2021-08-08T13:07:48","date_gmt":"2021-08-08T10:07:48","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=7451"},"modified":"2026-03-16T10:15:06","modified_gmt":"2026-03-16T08:15:06","slug":"sonarqube-and-java","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-and-java\/","title":{"rendered":"SonarQube and Java"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"450\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/java-sonarqube.webp\" alt=\"java-sonarqube\" class=\"wp-image-7545\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/java-sonarqube.webp 930w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/java-sonarqube-300x145.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/java-sonarqube-768x372.webp 768w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/figure>\n<\/div>\n\n\n<style>\n#content.post-single {\n    width: 88%;\n    margin: 0 auto;\n    float: none;\n    max-width: 88%;\n}\n@media screen and (max-width: 650px) {\nbody .is-layout-flex {\n    flex-direction: column-reverse;\n}\n}\n<\/style>\n\n\n\n<p><\/p>\n\n\n\n<p>SonarQube \u05de\u05e6\u05d9\u05e2 \u05e1\u05e8\u05d9\u05e7\u05ea \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 (SAST) \u05e9\u05dc \u05de\u05e2\u05dc 25 \u05e9\u05e4\u05d5\u05ea. \u05d0\u05d7\u05ea \u05d4\u05e4\u05d5\u05e4\u05d5\u05dc\u05e8\u05d9\u05d5\u05ea \u05d1\u05d9\u05e0\u05d9\u05d4\u05df \u05d4\u05d9\u05d0 Java .<br>\u05d4\u05db\u05dc\u05d9 \u05d9\u05d5\u05d3\u05e2 \u05dc\u05ea\u05de\u05d5\u05da \u05d1 -4 \u05d4\u05d9\u05d1\u05d8\u05d9\u05dd:<br>Bugs, Security Vulnerability,&nbsp; Security Hotspot, Code Smell \u05d5\u05db\u05d5',<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading\" id=\"bugs\">Bugs<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"363\" data-id=\"7456\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-1024x363.webp\" alt=\"\" class=\"wp-image-7456\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-1024x363.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-300x106.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-768x272.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-1536x545.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen1-2048x727.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"419\" data-id=\"7457\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-1024x419.webp\" alt=\"\" class=\"wp-image-7457\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-1024x419.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-300x123.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-768x314.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-1536x628.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen2-2048x837.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" data-id=\"7458\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-1024x417.webp\" alt=\"\" class=\"wp-image-7458\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-1024x417.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-300x122.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-768x313.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-1536x626.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/bug-screen3-2048x834.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-vulnerability\">Security Vulnerability<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"443\" data-id=\"7466\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-1024x443.webp\" alt=\"vulnerability-1\" class=\"wp-image-7466\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-1024x443.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-300x130.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-768x333.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-1536x665.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-1-2048x887.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"496\" data-id=\"7467\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-1024x496.webp\" alt=\"vulnerability-2\" class=\"wp-image-7467\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-1024x496.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-300x145.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-768x372.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-1536x744.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-2-2048x992.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" data-id=\"7468\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-1024x413.webp\" alt=\"vulnerability-3\" class=\"wp-image-7468\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-1024x413.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-300x121.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-768x310.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-1536x619.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/vulnerability-3-2048x826.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-hotspot\">Security Hotspot<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" data-id=\"7530\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-1024x341.webp\" alt=\"\" class=\"wp-image-7530\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-1024x341.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-300x100.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-768x256.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-1536x512.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Disabling-Spring-2048x683.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"325\" data-id=\"7531\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-1024x325.webp\" alt=\"\" class=\"wp-image-7531\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-1024x325.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-300x95.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-768x243.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-1536x487.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-Changing-accessibility-2048x649.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"407\" data-id=\"7532\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-1024x407.webp\" alt=\"\" class=\"wp-image-7532\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-1024x407.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-300x119.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-768x305.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-1536x610.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-security-hotspot-creating-cookies-2048x813.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"code-smell\">Code Smell<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"285\" data-id=\"7538\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-1024x285.webp\" alt=\"\" class=\"wp-image-7538\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-1024x285.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-300x84.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-768x214.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-1536x428.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Increment-2048x571.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"409\" data-id=\"7539\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-1024x409.webp\" alt=\"\" class=\"wp-image-7539\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-1024x409.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-300x120.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-768x306.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-1536x613.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-Collapsible-2048x817.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"306\" data-id=\"7540\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-1024x306.webp\" alt=\"\" class=\"wp-image-7540\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-1024x306.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-300x90.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-768x229.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-1536x459.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Java-code-smell-if-else-2048x612.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"OWASP\">Java Coverage of OWASP TOP 10 2017<\/h3>\n\n\n\n<p>SonarQube \u05de\u05e1\u05e4\u05e7\u05ea \u05d3\u05d5&quot;\u05d7 \u05e1\u05d8\u05d8\u05d5\u05e1 \u05e2\u05d3\u05db\u05e0\u05d9 \u05e9\u05dc \u05de\u05e6\u05d1 \u05d4\u05e7\u05d5\u05d3 \u05e9\u05dc\u05da \u05d1\u05d9\u05d7\u05e1 \u05dc- 10 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8,<br>\u05db\u05e4\u05d9 \u05e9\u05d4\u05d5\u05d2\u05d3\u05e8\u05d5 \u05e2&quot;\u05d9 \u05d4\u05e1\u05d8\u05e0\u05d3\u05e8\u05d8 OWASP \u05d4\u05e2\u05d5\u05dc\u05de\u05d9.<\/p>\n\n\n\n<figure class=\"wp-block-table module--owasp-coverage-table\"><table class=\"has-fixed-layout\"><thead><tr><th>&nbsp;<\/th><th>&nbsp;<\/th><th><span class=\"text-mention\">Security<\/span><br><strong>Vulnerability<\/strong><\/th><th><span class=\"text-mention\">Security<\/span><br><strong>Hotspot<\/strong><\/th><\/tr><\/thead><tbody><tr><td>A1<\/td><td>Injection<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A2<\/td><td>Broken Authentication<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A3<\/td><td>Sensitive Data Exposure<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A4<\/td><td>XML External Entities (XXE)<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><\/tr><tr><td>A5<\/td><td>Broken Access control<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A6<\/td><td>Security misconfigurations<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A7<\/td><td>Cross Site Scripting (XSS)<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A8<\/td><td>Insecure Deserialization<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A9<\/td><td>Using Components with known vulnerabilities<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><\/tr><tr><td>A10<\/td><td>Insufficient logging and monitoring<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"alm-box alm-contact\" style=\"display: inline-block;position:sticky;top:50px;background-color:#fffad7;\">\n<h3>\u05ea\u05d5\u05db\u05df \u05e2\u05e0\u05d9\u05d9\u05e0\u05d9\u05dd<\/h3>\n<ul>\n<li class=\"\"><a style=\"opacity: 1;\" href=\"#bugs\"> Bugs<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#security-vulnerability\">Security Vulnerability<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#security-hotspot\">Security Hotspot<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#code-smell\">Code Smell<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#OWASP\">Java coverage of OWASP TOP 10 2017<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><span id=\"bugs\">&nbsp;<\/span><\/p>\n\n\n\n<p><span id=\"code-smell\">&nbsp;<\/span><\/p>\n\n\n\n<div class=\"alm-box\">\n<h4>\u05dc\u05ea\u05e9\u05d5\u05de\u05ea \u05dc\u05d1: \u05ea\u05de\u05d9\u05db\u05d4 \u05d1\u05d3\u05d5&quot;\u05d7\u05d5\u05ea Security \u05d5 \u2013 OWASP \u05e7\u05d9\u05d9\u05de\u05ea \u05e8\u05e7 \u05d1\u05de\u05d4\u05d3\u05d5\u05e8\u05ea SonarQube Enterprise .<\/h4>\n<p><em class=\"\">\u05d7\u05d1\u05e8\u05ea ALM-Toolbox \u05d4\u05d9\u05d0 \u05d4\u05de\u05e4\u05d9\u05e6\u05d4 \u05d4\u05e8\u05e9\u05de\u05d9\u05ea \u05d4\u05d9\u05d7\u05d9\u05d3\u05d4 \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea SonarSource (\u05d9\u05e6\u05e8\u05e0\u05d9\u05ea SonarQube , SonarCloud \u05d5- SonarLint) \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea, \u05d5\u05de\u05e1\u05e4\u05e7\u05ea \u05ea\u05de\u05d9\u05db\u05d4, \u05d4\u05d3\u05e8\u05db\u05d5\u05ea, \u05d9\u05e2\u05d5\u05e5, \u05e9\u05d9\u05e8\u05d5\u05ea \u05de\u05e0\u05d5\u05d4\u05dc \u05d5\u05e8\u05e9\u05d9\u05d5\u05e0\u05d5\u05ea \u05dc- SonarQube \u05d5\u05dc\u05de\u05d2\u05d5\u05d5\u05df \u05db\u05dc\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d5- DevOps \u05de\u05e9\u05dc\u05d9\u05de\u05d9\u05dd. \u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 <a href=\"mailto:sonarqube@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">sonarqube@almtoolbox.com<\/a>&nbsp;\u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/em><\/p>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u05d0\u05ea\u05e8 <a href=\"https:\/\/www.almtoolbox.com\/il\/sonarqube\" target=\"_blank\" rel=\"noopener\">SonarQube \u05d9\u05e9\u05e8\u05d0\u05dc<\/a><\/li>\n\n\n\n<li>\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 &#8211; <a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-enterprise-webinar\/\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e1\u05d1\u05e8 \u05e2\u05dc SonarQube &amp; Code Security<\/a> (\u05e2\u05d1\u05e8\u05d9\u05ea)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-dell-webinar\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 \u05e2\u05dd \u05e1\u05d9\u05e4\u05d5\u05e8 \u05dc\u05e7\u05d5\u05d7: SonarQube @ Dell<\/a><\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SonarQube \u05de\u05e6\u05d9\u05e2 \u05e1\u05e8\u05d9\u05e7\u05ea \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 (SAST) \u05e9\u05dc \u05de\u05e2\u05dc 25 \u05e9\u05e4\u05d5\u05ea. \u05d0\u05d7\u05ea \u05d4\u05e4\u05d5\u05e4\u05d5\u05dc\u05e8\u05d9\u05d5\u05ea \u05d1\u05d9\u05e0\u05d9\u05d4\u05df \u05d4\u05d9\u05d0 Java .\u05d4\u05db\u05dc\u05d9 \u05d9\u05d5\u05d3\u05e2 \u05dc\u05ea\u05de\u05d5\u05da \u05d1 -4 \u05d4\u05d9\u05d1\u05d8\u05d9\u05dd:Bugs, Security Vulnerability,&nbsp; Security Hotspot, Code Smell \u05d5\u05db\u05d5', Bugs Security Vulnerability Security Hotspot Code Smell Java Coverage of OWASP TOP 10 2017 SonarQube \u05de\u05e1\u05e4\u05e7\u05ea \u05d3\u05d5&quot;\u05d7 \u05e1\u05d8\u05d8\u05d5\u05e1 \u05e2\u05d3\u05db\u05e0\u05d9 \u05e9\u05dc \u05de\u05e6\u05d1 \u05d4\u05e7\u05d5\u05d3 \u05e9\u05dc\u05da \u05d1\u05d9\u05d7\u05e1 \u05dc- 10 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[488,614,367],"tags":[646,645,591,338],"class_list":["post-7451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-java","category-sonarlint","category-sonarqube","tag-code-analysis","tag-code-quality","tag-java-security","tag-sast"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=7451"}],"version-history":[{"count":4,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7451\/revisions"}],"predecessor-version":[{"id":13518,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7451\/revisions\/13518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/7527"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=7451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=7451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=7451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}