Codacy Platform (15)

Common Vulnerabilities and Exposures (CVE)
Understanding Common Vulnerabilities and Exposures (CVE): A Complete Guide   
If you’re worried about home security, there are many things you can do to keep your house safe from burglars. The same goes for keeping your software...
software composition analysis
Software Composition Analysis (SCA): A Complete Guide
Say you want to make a pizza from scratch. You have to combine ingredients like flour, yeast, water, tomato sauce, cheese, and any other topping you...
Cyclomatic Complexity: A Complete Guide
Imagine you're driving through a complex intersection with multiple traffic lights and lanes. Each traffic light represents a decision point where you...
code complexity
Code Complexity: A Complete Guide
Picture a city skyline, where skyscrapers rise over time. In the urban sprawl, new buildings are erected to meet the demands of population growth,...
penetration testing
Penetration Testing: A Complete Guide
You wouldn't buy a car without ensuring its safety features have undergone rigorous testing, would you? Why risk using an application that hasn't...
every code review is a security review
Every Code Review Is a Security Review
If you had a mission statement for your engineering team, it would probably emphasize delivering features, functionality, and value for users.

Subscribe
to our blog

Stay updated with our monthly newsletter.