Codacy Security (3)

cryptographic failures
Cryptographic Failures: A Complete Guide
In 2022, there were 1,802 data compromises in the U.S. alone. In 2023, that number soared to 3,205, and it will only continue to increase as bad actors...
injection attacks
Understanding Injection Attacks and How to Avoid Them
In 2017, attackers wreaked havoc for 76 days before Equifax finally discovered the breach. Several security lapses had allowed attackers to access the...
keep ai generated code secure
How To Keep Your AI-Generated Code Secure
Many software developers use AI coding assistants like ChatGPT and GitHub Copilot to significantly speed up their development process, relying on them...
container security
Container Security: A Complete Guide
Imagine moving to a new house, packing each box with specific items, and labeling them clearly. You want to ensure each box is secure, that nothing...
proactive SCA scans feature
New Feature: Proactive Software Composition Analysis (SCA) Scan
We’re excited to announce the launch of our proactive software composition analysis (SCA) scans, which are available to all our business-tier...
Codacy Security Adds Thousands of New SAST Rules With Semgrep Integration
If 2023 taught us anything, it’s that code quality and code security are inextricably linked. Their main commonality? They are both required upstream...

Subscribe
to our blog

Stay updated with our monthly newsletter.