Codacy

Codacy

coding standards customization feature
New Feature: Customizing Patterns When Following Coding Standards
We’re excited to announce a new feature that will give developers using Codacy more freedom and power than ever to tailor their code analysis...
proactive SCA scans feature
New Feature: Proactive Software Composition Analysis (SCA) Scan
We’re excited to announce the launch of our proactive software composition analysis (SCA) scans, which are available to all our business-tier...
continuous non blocking code reviews
How to Perform Continuous, Non-Blocking Code Reviews
If you own an Internet-based enterprise, your main branch powers your business and should be protected at all costs. Code reviews are how engineering...
sast and dast tools for api security
The Role of SAST and DAST Tools in API Security
APIs—Application Programming Interfaces—help software talk to other software. They make it easier to build applications because developers can plug...
sast and dast tools for threat modeling
The Role of SAST and DAST Tools in Threat Modeling
Imagine preparing for storm season. You check your windows, bring in your bike or kids’ toys from the yard, trim your tree branches, ensure your...
server-side request forgery
Understanding Server-Side Request Forgery (SSRF) and How to Prevent It
Server-Side Request Forgery (SSRF) is a critical web vulnerability that allows attackers to trick a server into making unauthorized requests to...

Subscribe
to our blog

Stay updated with our monthly newsletter.