{"id":7515,"date":"2025-11-16T13:35:00","date_gmt":"2025-11-16T11:35:00","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=7515"},"modified":"2026-03-16T10:03:06","modified_gmt":"2026-03-16T08:03:06","slug":"sonarqube-and-csharp","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-and-csharp\/","title":{"rendered":"#SonarQube and C"},"content":{"rendered":"\n<style>\n#content.post-single {\n    width: 88%;\n    margin: 0 auto;\n    float: none;\n    max-width: 88%;\n}\n@media screen and (max-width: 650px) {\nbody .is-layout-flex {\n    flex-direction: column-reverse;\n}\n}\n<\/style>\n\n\n\n<p>\u05d1\u05de\u05d0\u05de\u05e8 \u05d4\u05d1\u05d0 \u05d0\u05e1\u05e7\u05d5\u05e8 \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05e9\u05dc SonarQube \u05d4\u05e7\u05e9\u05d5\u05e8\u05d5\u05ea \u05dc #C \u05d5\u05e2\u05d5\u05d6\u05e8\u05d5\u05ea \u05dc\u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05d5\u05dc\u05de\u05e0\u05d4\u05dc\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7, \u05db\u05d5\u05dc\u05dc \u05d4\u05d3\u05d2\u05de\u05d5\u05ea.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"450\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/c-sonarqube.jpg\" alt=\"c-sonarqube\" class=\"wp-image-7560\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/c-sonarqube.jpg 930w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/c-sonarqube-300x145.jpg 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/c-sonarqube-768x372.jpg 768w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>SonarQube \u05de\u05e6\u05d9\u05e2 \u05e1\u05e8\u05d9\u05e7\u05ea \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 (SAST) \u05e9\u05dc \u05dc\u05de\u05e2\u05dc\u05d4 \u05de- 30 \u05e9\u05e4\u05d5\u05ea \u05d5- framworks (\u05db\u05d5\u05dc\u05dc \u05e9\u05e4\u05d5\u05ea \u05ea\u05e9\u05ea\u05d9\u05ea).<br>\u05d0\u05d7\u05ea \u05d4\u05e4\u05d5\u05e4\u05d5\u05dc\u05e8\u05d9\u05d5\u05ea \u05d1\u05d9\u05e0\u05d9\u05d4\u05df \u05d4\u05d9\u05d0&nbsp;<em>#C<\/em>.<br>\u05d4\u05db\u05dc\u05d9 \u05de\u05e6\u05d9\u05e2 \u05dc\u05de\u05e2\u05dc\u05d4 \u05de- 490 \u05d7\u05d5\u05e7\u05d9\u05dd \u05dc- #C (\u05d7\u05dc\u05e7 \u05d2\u05d3\u05d5\u05dc \u05de\u05d4\u05dd \u05d9\u05d7\u05d5\u05d3\u05d9\u05d9\u05dd), \u05d5\u05d9\u05d5\u05d3\u05e2 \u05dc\u05ea\u05de\u05d5\u05da \u05d1 -5 \u05d4\u05d9\u05d1\u05d8\u05d9\u05dd:<br>Bugs, Security Vulnerability,&nbsp; Security Hotspot, Code Smell \u05d5- Quick fix .<br><em>\u05e0\u05d9\u05ea\u05df \u05dc\u05e7\u05d1\u05dc \u05de\u05d0\u05d9\u05ea\u05e0\u05d5 \u05e7\u05d5\u05d1\u05e5 \u05d0\u05e7\u05e1\u05dc \u05de\u05e4\u05d5\u05e8\u05d8 \u05d5\u05e2\u05d3\u05db\u05e0\u05d9 \u05d4\u05db\u05d5\u05dc\u05dc \u05d0\u05ea \u05db\u05dc \u05d4\u05d7\u05d5\u05e7\u05d9\u05dd \u05dc- #C (\u05d5\u05d2\u05dd \u05dc\u05e9\u05e4\u05d5\u05ea \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea) &#8211; \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 \u05d1\u05de\u05d9\u05d9\u05dc \u05d4\u05e8\u05e9\u05d5\u05dd \u05de\u05d8\u05d4.<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading alm-box has-background\" style=\"background-color:#fff7ea\"><em class=\"\">\u05e9\u05d0\u05dc\u05d5\u05ea? \u05e0\u05d9\u05ea\u05df \u05dc\u05e4\u05e0\u05d5\u05ea \u05d0\u05dc\u05d9\u05e0\u05d5 \u05d5\u05e0\u05e9\u05de\u05d7 \u05dc\u05e2\u05e0\u05d5\u05ea! \u05de\u05d9\u05d9\u05dc&nbsp;<a href=\"mailto:sonarqube@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">sonarqube@almtoolbox.com<\/a>&nbsp;(\u05d8\u05dc\u05e4\u05d5\u05df \u05d1\u05d4\u05de\u05e9\u05da \u05d4\u05de\u05d0\u05de\u05e8)<\/em><\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading\" id=\"bugs\">Bugs (\u05d1\u05d0\u05d2\u05d9\u05dd)<\/h3>\n\n\n\n<p>\u05d1- SonarQube \u05dc\u05de\u05e2\u05dc\u05d4 \u05de- 85 \u05d7\u05d5\u05e7\u05d9\u05dd \u05dc- #C, \u05d4\u05de\u05d5\u05e6\u05d0\u05d9\u05dd \u05d1\u05d0\u05d2\u05d9\u05dd \u05d5\u05de\u05e1\u05d1\u05d9\u05e8\u05d9\u05dd \u05db\u05d9\u05e6\u05d3 \u05dc\u05ea\u05e7\u05df \u05d0\u05d5\u05ea\u05dd.<br>\u05dc\u05d4\u05dc\u05df \u05de\u05e1\u05e4\u05e8 \u05d3\u05d5\u05d2\u05de\u05d0\u05d5\u05ea:<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"371\" data-id=\"7562\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-1024x371.webp\" alt=\"Null pointers should not be dereferenced\" class=\"wp-image-7562\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-1024x371.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-300x109.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-768x279.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-1536x557.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Null-pointers-2048x743.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"244\" data-id=\"7563\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-1024x244.webp\" alt=\"Recursion should not be infinite\" class=\"wp-image-7563\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-1024x244.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-300x72.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-768x183.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-1536x366.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-1-2048x488.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"281\" data-id=\"7564\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-1024x281.webp\" alt=\"Recursion should not be infinite\" class=\"wp-image-7564\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-1024x281.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-300x82.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-768x210.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-1536x421.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Recursion-2-2048x561.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"vulnerability\">Security Vulnerability&nbsp;(\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05d4)<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" data-id=\"7566\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-1024x478.webp\" alt=\"Regular expressions should not be vulnerable to Denial of Service attacks\" class=\"wp-image-7566\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-1024x478.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-300x140.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-768x359.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-1536x717.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/Regular-expressions-2048x956.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"469\" data-id=\"7567\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-1024x469.webp\" alt=\"I\/O function calls should not be vulnerable to path injection attacks\" class=\"wp-image-7567\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-1024x469.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-300x137.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-768x352.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-1536x703.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/IO-function-calls-2048x937.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-scaled.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"436\" data-id=\"7568\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-1024x436.webp\" alt=\"OS commands should not be vulnerable to command injection attacks\" class=\"wp-image-7568\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-1024x436.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-300x128.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-768x327.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-1536x655.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/OS-commands-2048x873.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"hotspot\">Security Hotspot<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"115\" data-id=\"7570\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-1024x115.webp\" alt=\"Dynamically executing code is security-sensitive\" class=\"wp-image-7570\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-1024x115.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-300x34.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-768x86.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-1536x172.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/dynamically-executing-2048x230.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"119\" data-id=\"7571\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-1024x119.webp\" alt=\"Changing or bypassing accessibility is security-sensitive\" class=\"wp-image-7571\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-1024x119.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-300x35.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-768x89.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-1536x178.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/changing-bypassing-2048x237.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"157\" data-id=\"7572\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-1024x157.webp\" alt=\"Controlling permissions is security-sensitive\" class=\"wp-image-7572\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-1024x157.webp 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-300x46.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-768x118.webp 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-1536x235.webp 1536w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/controlling-permissions-2048x314.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"code-smell\">Code Smell<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/trivial-properties.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"185\" data-id=\"7574\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/trivial-properties.webp\" alt=\"Trivial properties should be auto-implemented\" class=\"wp-image-7574\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/trivial-properties.webp 950w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/trivial-properties-300x58.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/trivial-properties-768x150.webp 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/cognitive-complexity.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"653\" data-id=\"7575\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/cognitive-complexity.webp\" alt=\"Cognitive Complexity of methods should not be too high\" class=\"wp-image-7575\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/cognitive-complexity.webp 950w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/cognitive-complexity-300x206.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/cognitive-complexity-768x528.webp 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/if-else.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"555\" data-id=\"7576\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/if-else.webp\" alt=\"&quot;if ... else if&quot; constructs should end with &quot;else&quot; clauses\" class=\"wp-image-7576\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/if-else.webp 950w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/if-else-300x175.webp 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/08\/if-else-768x449.webp 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\u05de\u05d4 \u05d4\u05d5\u05e4\u05da \u05d0\u05ea SonarQube \u05dc\u05de\u05ea\u05d0\u05d9\u05dd \u05d1\u05de\u05d9\u05d5\u05d7\u05d3 \u05dc- #C ?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u05de\u05d2\u05d5\u05d5\u05df \u05e8\u05d7\u05d1 \u05e9\u05dc \u05d7\u05d5\u05e7\u05d9\u05dd (\u05de\u05e2\u05dc 490)<\/li>\n\n\n\n<li>\u05d4\u05ea\u05d0\u05de\u05d4 \u05dc\u05e1\u05d8\u05e0\u05d3\u05e8\u05d8\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd \u05e9\u05dc #C (\u05db\u05d2\u05d5\u05df Winforms, WPF, .NET Core)<\/li>\n\n\n\n<li>\u05d2\u05d9\u05e9\u05ea &quot;Clean Code&quot;<\/li>\n\n\n\n<li>\u05e1\u05e8\u05d9\u05e7\u05d4 \u05de\u05d4\u05d9\u05e8\u05d4! \u05db\u05d5\u05dc\u05dc \u05e1\u05e8\u05d9\u05e7\u05d4 \u05d0\u05d9\u05e0\u05e7\u05e8\u05de\u05e0\u05d8\u05dc\u05d9\u05ea (Incremental analysis) \u05e8\u05e7 \u05e2\u05dc \u05d4\u05e7\u05d5\u05d3 \u05e9\u05d4\u05e9\u05ea\u05e0\u05d4,<br>\u05d5\u05db\u05df \u05e1\u05e8\u05d9\u05e7\u05d4 \u05de\u05e7\u05d1\u05d9\u05dc\u05d9\u05ea (Multi-threaded analysis) \u05dc\u05e0\u05d9\u05e6\u05d5\u05dc \u05de\u05d9\u05d8\u05d1\u05d9 \u05e9\u05dc \u05de\u05e9\u05d0\u05d1\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1<\/li>\n\n\n\n<li>\u05d0\u05d9\u05ea\u05d5\u05e8 \u05d1\u05d0\u05d2\u05d9\u05dd \u05d4\u05e7\u05e9\u05d5\u05e8\u05d9\u05dd \u05dc\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d5- Security<\/li>\n\n\n\n<li>\u05d0\u05d9\u05e0\u05d8\u05d2\u05e8\u05e6\u05d9\u05d4 \u05d7\u05d6\u05e7\u05d4 \u05de\u05d5\u05dc \u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d5- CI<\/li>\n\n\n\n<li>\u05d0\u05d9\u05e0\u05d8\u05d2\u05e8\u05e6\u05d9\u05d4 \u05de\u05d5\u05dc IDEs \u05d5\u05db\u05dc\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d4\u05ea\u05d5\u05de\u05db\u05d9\u05dd \u05d1- #C<\/li>\n\n\n\n<li>\u05ea\u05de\u05d9\u05db\u05d4 \u05d0\u05d9\u05db\u05d5\u05ea\u05d9\u05ea \u05e9\u05dc \u05d4\u05d9\u05e6\u05e8\u05df, \u05db\u05d5\u05dc\u05dc \u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05dc\u05ea\u05de\u05d9\u05db\u05d4 \u05d1\u05d0\u05e8\u05e5 \u05d0\u05d5 \u05e9\u05d9\u05e8\u05d5\u05ea \u05de\u05e0\u05d5\u05d4\u05dc (\u05e9\u05dc\u05e0\u05d5) \u05d4\u05d7\u05d5\u05e1\u05da \u05de\u05db\u05dd \u05d0\u05ea \u05d4\u05e6\u05d5\u05e8\u05da \u05dc\u05d4\u05ea\u05e2\u05e1\u05e7 \u05d1\u05ea\u05d7\u05d6\u05d5\u05e7\u05ea \u05d4\u05e9\u05e8\u05ea \u05d5\u05d1\u05ea\u05e4\u05e2\u05d5\u05dc\u05d5 \u05d4\u05e9\u05d5\u05d8\u05e3<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"OWASP\">C# Coverage of OWASP TOP 10 2021<\/h3>\n\n\n\n<p>SonarQube \u05de\u05e1\u05e4\u05e7\u05ea \u05d3\u05d5&quot;\u05d7 \u05e1\u05d8\u05d8\u05d5\u05e1 \u05e2\u05d3\u05db\u05e0\u05d9 \u05e9\u05dc \u05de\u05e6\u05d1 \u05d4\u05e7\u05d5\u05d3 \u05e9\u05dc\u05da \u05d1\u05d9\u05d7\u05e1 \u05dc- 10 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d4\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8,<br>\u05db\u05e4\u05d9 \u05e9\u05d4\u05d5\u05d2\u05d3\u05e8\u05d5 \u05e2&quot;\u05d9 \u05d4\u05e1\u05d8\u05e0\u05d3\u05e8\u05d8 OWASP \u05d4\u05e2\u05d5\u05dc\u05de\u05d9.<\/p>\n\n\n\n<figure class=\"wp-block-table module--owasp-coverage-table\"><table class=\"has-fixed-layout\"><thead><tr><th>&nbsp;<\/th><th>&nbsp;<\/th><th><span class=\"text-mention\">Security<\/span><br><strong>Vulnerability<\/strong><\/th><th><span class=\"text-mention\">Security<\/span><br><strong>Hotspot<\/strong><\/th><\/tr><\/thead><tbody><tr><td>A1<\/td><td>Injection<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A2<\/td><td>Broken Authentication<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A3<\/td><td>Sensitive Data Exposure<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A4<\/td><td>XML External Entities (XXE)<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><\/tr><tr><td>A5<\/td><td>Broken Access control<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A6<\/td><td>Security misconfigurations<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A7<\/td><td>Cross Site Scripting (XSS)<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A8<\/td><td>Insecure Deserialization<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><tr><td>A9<\/td><td>Using Components with known vulnerabilities<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><\/tr><tr><td>A10<\/td><td>Insufficient logging and monitoring<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8211;<\/td><td class=\"has-text-align-center\" data-align=\"center\"><figure><img decoding=\"async\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2021\/12\/v-icon-g.png\" alt=\"v\"><\/figure><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"alm-box alm-contact\" style=\"display: inline-block;position:sticky;top:50px;background-color:#e5f6f9;\">\n<h3>\u05ea\u05d5\u05db\u05df \u05e2\u05e0\u05d9\u05d9\u05e0\u05d9\u05dd<\/h3>\n<ul>\n<li class=\"\"><a style=\"opacity: 1;\" href=\"#bugs\"> Bugs<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#vulnerability\">Security Vulnerability<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#hotspot\">Security Hotspot<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#code-smell\">Code Smell<\/a><\/li>\n<li><a style=\"opacity: 1;\" href=\"#OWASP\">Java coverage of OWASP TOP 10 2017<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><span id=\"vulnerability\">&nbsp;<\/span><\/p>\n\n\n\n<p><span id=\"code-smell\">&nbsp;<\/span><\/p>\n\n\n\n<div class=\"alm-box\">\n<h4>\u05dc\u05ea\u05e9\u05d5\u05de\u05ea \u05dc\u05d1: \u05ea\u05de\u05d9\u05db\u05d4 \u05d1\u05d3\u05d5&quot;\u05d7\u05d5\u05ea Security \u05d5 \u2013 OWASP \u05e7\u05d9\u05d9\u05de\u05ea \u05e8\u05e7 \u05d1\u05de\u05d4\u05d3\u05d5\u05e8\u05ea SonarQube Enterprise .<\/h4>\n<p><em class=\"\">\u05d7\u05d1\u05e8\u05ea ALM-Toolbox \u05d4\u05d9\u05d0 \u05d4\u05de\u05e4\u05d9\u05e6\u05d4 \u05d4\u05e8\u05e9\u05de\u05d9\u05ea \u05d4\u05d9\u05d7\u05d9\u05d3\u05d4 \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea SonarSource (\u05d9\u05e6\u05e8\u05e0\u05d9\u05ea SonarQube , SonarCloud \u05d5- SonarLint) \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea, \u05d5\u05de\u05e1\u05e4\u05e7\u05ea \u05ea\u05de\u05d9\u05db\u05d4, \u05d4\u05d3\u05e8\u05db\u05d5\u05ea, \u05d9\u05e2\u05d5\u05e5, \u05e9\u05d9\u05e8\u05d5\u05ea \u05de\u05e0\u05d5\u05d4\u05dc \u05d5\u05e8\u05e9\u05d9\u05d5\u05e0\u05d5\u05ea \u05dc- SonarQube \u05d5\u05dc\u05de\u05d2\u05d5\u05d5\u05df \u05db\u05dc\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d5- DevOps \u05de\u05e9\u05dc\u05d9\u05de\u05d9\u05dd. \u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5 <a href=\"mailto:sonarqube@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">sonarqube@almtoolbox.com<\/a>&nbsp;\u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/em><\/p>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u05d0\u05ea\u05e8 <a href=\"https:\/\/www.almtoolbox.com\/il\/sonarqube\" target=\"_blank\" rel=\"noopener\">SonarQube \u05d9\u05e9\u05e8\u05d0\u05dc<\/a><\/li>\n\n\n\n<li>\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 &#8211; <a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-webinar-sep-2025\/\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e1\u05d1\u05e8 \u05e2\u05dc SonarQube &amp; Code Security<\/a> (\u05e2\u05d1\u05e8\u05d9\u05ea, \u05e1\u05e4\u05d8\u05de\u05d1\u05e8 2025)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/sonarqube-dell-webinar\" target=\"_blank\" rel=\"noopener\">\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 \u05e2\u05dd \u05e1\u05d9\u05e4\u05d5\u05e8 \u05dc\u05e7\u05d5\u05d7: SonarQube @ Dell<\/a><\/li>\n\n\n\n<li>\u05d4\u05e7\u05dc\u05d8\u05ea \u05d5\u05d5\u05d1\u05d9\u05e0\u05e8 \u05e2\u05dd \u05e1\u05d9\u05e4\u05d5\u05e8 \u05dc\u05e7\u05d5\u05d7: SonarQube @ Nice<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><em>\u05d4\u05de\u05d0\u05de\u05e8 \u05e4\u05d5\u05e8\u05e1\u05dd \u05dc\u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 \u05d1\u05d0\u05d5\u05d2\u05d5\u05e1\u05d8 2021<\/em> \u05d5\u05e2\u05d5\u05d3\u05db\u05df \u05de\u05d0\u05d6 \u05de\u05e1\u05e4\u05e8 \u05e4\u05e2\u05dd\u05de\u05d9\u05dd.<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>SonarQube \u05de\u05e6\u05d9\u05e2 \u05e1\u05e8\u05d9\u05e7\u05ea \u05e7\u05d5\u05d3 \u05e1\u05d8\u05d8\u05d9 \u05e9\u05dc \u05e9\u05e4\u05d5\u05ea \u05e8\u05d1\u05d5\u05ea, \u05d5\u05d0\u05d7\u05ea \u05d4\u05e4\u05d5\u05e4\u05d5\u05dc\u05e8\u05d9\u05d5\u05ea \u05d1\u05d9\u05e0\u05d9\u05d4\u05df \u05d4\u05d9\u05d0 #C. \u05d4\u05db\u05dc\u05d9 \u05d9\u05d5\u05d3\u05e2 \u05dc\u05d0\u05ea\u05e8 Bugs, Security Vulnerability,\u00a0 Hotspot , Code Smell<\/p>\n","protected":false},"author":4,"featured_media":7560,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[488,614,367],"tags":[705,1032,646,645,1033,591,338],"class_list":["post-7515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-java","category-sonarlint","category-sonarqube","tag-net","tag-c-4","tag-code-analysis","tag-code-quality","tag-dot-net","tag-java-security","tag-sast"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=7515"}],"version-history":[{"count":7,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7515\/revisions"}],"predecessor-version":[{"id":13512,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7515\/revisions\/13512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/7560"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=7515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=7515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=7515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}