This is a step-by-step guide on connecting AI code editors with any MCP server, integrating the MCP servers for GitHub and Codacy (Codacy Guardrails).| blog.codacy.com
A deep dive into code quality metrics, highlighting seven metrics and explaining how to monitor them and why they are important to code quality.| blog.codacy.com
Discover the benefits of continuous quality. Ensure clean, secure, and maintainable code by integrating static code analysis into your CI/CD pipeline.| blog.codacy.com
Learn more about code complexity; what increases code complexity, what the main metrics are that need to be measured, and how to reduce it.| blog.codacy.com
What is code coverage? Learn what code coverage is, why it's important, and what techniques and tools your development team can use to measure it.| blog.codacy.com
We explore software composition analysis (SCA), defining what it is, why it's important, and how SCA tools can help your development team.| blog.codacy.com
A complete guide to shift left testing that explains what it is, its benefits, and how your development team can implement shift left testing processes.| blog.codacy.com
We offer a complete look into software dependency management to help you understand why it's important and how to implement best practices.| blog.codacy.com
We discuss what shift left security means, its benefits and challenges, and how to implement shift left security into your development process.| blog.codacy.com
n this post, we define supply chain security and discuss some common challenges organizations face and best practices for ensuring supply chain security.| blog.codacy.com
A complete guide to application security that explains common security threats and best practices teams can use to secure and mitigate these threats.| blog.codacy.com
We explain what the OWASP is, its significance, its most popular OWASP Top 10 publication, and how to implement secure coding practices using them.| blog.codacy.com
Learn how linters help software developers improve their code quality in the earliest stages of the development process through static code analysis.| blog.codacy.com
Learn what pull requests are, what good and bad PRs look like, and what your team can do to optimize creating and analyzing pull requests.| blog.codacy.com
We take you through Codacy's definition of code quality to help you understand what high-quality code looks like, whether you use our platform or not.| blog.codacy.com
A guide to DevSecOps explaining what it is, why it is important, its connection with DevOps, and how to put it into practice in your development lifecycle.| blog.codacy.com
We take a look at Codacy's new security feature, insecure dependencies detection, as we continue to expand your ability to identify and solve security issues.| blog.codacy.com
We discuss OWASP Top 10 security risk injection attacks, explain what they are, give examples of these attacks, and offer tips on preventing them.| blog.codacy.com
This comprehensive guide explores SAST tools, explaining their functionalities and strategies for implementing them into your development workflow.| blog.codacy.com
This article will explore DAST tools, how they work, why they are essential, and how to implement these tools properly.| blog.codacy.com
We created a complete guide to cloud security posture management to explain what it is, why companies need to invest in it, its benefits, and more.| blog.codacy.com
Explore static code analysis tools. Understand what they are and how they can benefit your development team while learning about recommended tools.| blog.codacy.com
We explain static code analysis covering static analysis basics, tools, why it's key for testing and important for modern code review.| blog.codacy.com
Explore best practices for conducting effective code reviews in order to strengthen your defenses and keep your software secure.| blog.codacy.com
Check out the new features we've added to enhance and improve our security and risk management dashboard in Codacy.| blog.codacy.com
Managing code reviews for large-scale projects can be challenging. Here are some best practices your team can follow to improve your code review processes.| blog.codacy.com
We provide a deep analysis of secrets management to uncover why it's important, what makes it challenging, and how to implement this process successfully.| blog.codacy.com
With our Visual Studio Code extension, you can now integrate Codacy's code quality features directly into your VSCode workflow.| blog.codacy.com
We examine hard-coded secrets in depth, explaining what they are, why they are dangerous, how to detect them, and what to do if you find them in your code.| blog.codacy.com
We explore what Common Vulnerabilities and Exposures (CVE) are, and what software development companies can do to identify and mitigate them.| blog.codacy.com
This article discusses what clean code is and why it's essential and provides principles and best practices for writing clean and maintainable code.| blog.codacy.com