Ann,We are a small marketing company that has been using Veracode for our SAST tool, but are planning to switch and would like to switch to SonarQube.
What we've found is that
- There are some CWE checks that both Veracode and SonarQube perform
- SonarQube has additional CWE checks, mostly code quality, that Veracode does not have
- Veracode has a large number of CWE checks that SonarQube doesn’t have, including cryptographic issues, code injection, various C/C++ issues, backdoor checks, information leaks, cross-site scripting, and others
- The nature of SonarQube’s fast light-weight scans leads to a large number of FPs and a low number of true positives generated. For example: SonarQube’s SQL Injection rule doesn’t check to see if an attacker can pass a string to a SQL command, it just checks to see if the string being passed is non-constant. That is very FP prone.
- SonarQube is capable of finding only a few of the security flaws that Veracode can report on.
I'm "cold emailing" you because in my digging around the SonarSource site, I saw that you have published a lot of info/blogs/etc. related to the security rules.Can you help me understand what from the OWASP Top 10 is not being tested?
--This is important to us because we need to be PCI compliant and the auditors validate that we are testing our apps against each of the OWASP Top 10.I'd appreciate any help.Thank you,Julie Denning | Director, Information Security