If you use a JetBrains IDE like IntelliJ IDEA, you can now leverage Codacy Guardrails' real-time feedback and AI-aware safeguards.| Codacy | Blog - Automate your code quality
This week one of our competitors announced that there was a critical security vulnerability identified earlier this year that allowed for remote code execution in their system. If harnessed by bad agents, this could be used to do nefarious things, specifically, to expose customers’ code.| Codacy | Blog - Automate your code quality
Gain full visibility into all dependency vulnerabilities with Codacy's enhanced SCA granularity, offering better fix clarity and a new "High" severity classification for improved security management.| blog.codacy.com
Recap of our July 2025 Product Showcase and GPL License Scanner reveal, as our panel delved into the complexities of open-source licenses, potential compliance risks, and best practices for ensuring your codebase remains legally sound.| blog.codacy.com
News and thoughts on code quality, code reviews, code analytics and static analysis.| blog.codacy.com
Learn how to add deterministic Security Guardrails to Claude Code, making sure that every line of code is secure and compliant from the start.| blog.codacy.com
Key Outcomes:| Codacy | Blog - Automate your code quality
Gemini CLI (launched 25 Jun 2025) drops Google’s Gemini 2.5 Pro straight into your terminal with a whopping 1 M-token context and free preview limits.| Codacy | Blog - Automate your code quality
Learn how Codacy improved its rules documentation across over 20k static analysis rules and 50 languages using AI.| blog.codacy.com
High cyclomatic complexity can mean you have problems with your code base. We guide you through how to measure and reduce cyclomatic complexity in code.| blog.codacy.com
"Imagine vibe-coding in your favorite LLM, without the vibe migraine."| Codacy | Blog - Automate your code quality
This is a step-by-step guide on connecting AI code editors with any MCP server, integrating the MCP servers for GitHub and Codacy (Codacy Guardrails).| blog.codacy.com
Last week, we unveiled Codacy Guardrails and its first small “hello world” moment: an MCP server that can connect with Codacy security and quality data and effectively act, leveraging AI-assisted IDEs (VS Code Agent Mode, Cursor, Windsurf).| blog.codacy.com
A deep dive into code quality metrics, highlighting seven metrics and explaining how to monitor them and why they are important to code quality.| blog.codacy.com
Discover the benefits of continuous quality. Ensure clean, secure, and maintainable code by integrating static code analysis into your CI/CD pipeline.| blog.codacy.com
Ensure security and code quality in AI-assisted development with Codacy Guardrails. Supercharge AI coding assistants with MCP for safer, faster software.| blog.codacy.com
Learn more about code complexity; what increases code complexity, what the main metrics are that need to be measured, and how to reduce it.| blog.codacy.com
What is code coverage? Learn what code coverage is, why it's important, and what techniques and tools your development team can use to measure it.| blog.codacy.com
We explain technical debt, the types of technical debt that exist, how it's accrued, and how to reduce and manage technical debt in your organization.| blog.codacy.com
We explore software composition analysis (SCA), defining what it is, why it's important, and how SCA tools can help your development team.| blog.codacy.com
We take a deep dive into why code documentation is important and offer tips on how to document your code properly with best practices and available tools.| blog.codacy.com
A complete guide to shift left testing that explains what it is, its benefits, and how your development team can implement shift left testing processes.| blog.codacy.com
Codacy Security is our new security and risk management solution that will empower engineering teams to prioritize and fix their most critical security issues with a unified view.| blog.codacy.com
We offer a complete look into software dependency management to help you understand why it's important and how to implement best practices.| blog.codacy.com
We discuss what shift left security means, its benefits and challenges, and how to implement shift left security into your development process.| blog.codacy.com
We discuss how to think about integrating security into a CI/CD pipeline through automated security testing to ensure you get security and speed.| blog.codacy.com
Advancements in technology and decreased costs have made it feasible to implement a proactive approach to web application security.| blog.codacy.com
n this post, we define supply chain security and discuss some common challenges organizations face and best practices for ensuring supply chain security.| blog.codacy.com
Codacy CEO Jaime Jorge discusses why it's imperative to prioritize security in the earliest stages of the software development lifecycle.| blog.codacy.com
A complete guide to application security that explains common security threats and best practices teams can use to secure and mitigate these threats.| blog.codacy.com
We explain what the OWASP is, its significance, its most popular OWASP Top 10 publication, and how to implement secure coding practices using them.| blog.codacy.com
See how code quality fits into your CI/CD pipeline, allowing you to streamline the development process and reduce risks.| blog.codacy.com
Learn how linters help software developers improve their code quality in the earliest stages of the development process through static code analysis.| blog.codacy.com
Codacy CEO Jaime Jorge talks about building a culture in a software development organization that focuses on code and software quality above all else.| blog.codacy.com
Learn what pull requests are, what good and bad PRs look like, and what your team can do to optimize creating and analyzing pull requests.| blog.codacy.com
Everything you've ever wanted to know about coding standards. Understand what they are, why they are important, and how to implement them effectively.| blog.codacy.com
We take you through Codacy's definition of code quality to help you understand what high-quality code looks like, whether you use our platform or not.| blog.codacy.com
A guide to DevSecOps explaining what it is, why it is important, its connection with DevOps, and how to put it into practice in your development lifecycle.| blog.codacy.com
We take a look at Codacy's new security feature, insecure dependencies detection, as we continue to expand your ability to identify and solve security issues.| blog.codacy.com
We discuss OWASP Top 10 security risk injection attacks, explain what they are, give examples of these attacks, and offer tips on preventing them.| blog.codacy.com
This comprehensive guide explores SAST tools, explaining their functionalities and strategies for implementing them into your development workflow.| blog.codacy.com
This article will explore DAST tools, how they work, why they are essential, and how to implement these tools properly.| blog.codacy.com
We created a complete guide to cloud security posture management to explain what it is, why companies need to invest in it, its benefits, and more.| blog.codacy.com
We delve into methods and best practices for implementing AST within your organization to ensure robust protection against potential threats.| blog.codacy.com
A complete guide to SAST (Static Application Security Testing), why it's important, and how to implement code security best practices.| blog.codacy.com
We discuss how compliance can be a foundation for robust security practices and how to leverage compliance requirements to bolster your security posture.| blog.codacy.com
Explore static code analysis tools. Understand what they are and how they can benefit your development team while learning about recommended tools.| blog.codacy.com
We explain static code analysis covering static analysis basics, tools, why it's key for testing and important for modern code review.| blog.codacy.com
Explore best practices for conducting effective code reviews in order to strengthen your defenses and keep your software secure.| blog.codacy.com
We discuss the secure coding standards that, when implemented thoughtfully, offer tangible benefits that enhance the very essence of Agile development.| blog.codacy.com
Check out the new features we've added to enhance and improve our security and risk management dashboard in Codacy.| blog.codacy.com
Managing code reviews for large-scale projects can be challenging. Here are some best practices your team can follow to improve your code review processes.| blog.codacy.com
We provide a deep analysis of secrets management to uncover why it's important, what makes it challenging, and how to implement this process successfully.| blog.codacy.com
With our Visual Studio Code extension, you can now integrate Codacy's code quality features directly into your VSCode workflow.| blog.codacy.com
We examine hard-coded secrets in depth, explaining what they are, why they are dangerous, how to detect them, and what to do if you find them in your code.| blog.codacy.com
A complete guide to DAST (Dynamic Application Security Testing). Learn about what is it, why it is important, and how to implement it.| blog.codacy.com
We examine software development best practices for measuring, managing, and tackling technical debt, particularly in Agle.| blog.codacy.com
We explore what Common Vulnerabilities and Exposures (CVE) are, and what software development companies can do to identify and mitigate them.| blog.codacy.com
A complete guide to penetration testing that discusses what it is, why it's important, what types of pen tests exists, and how penetration testing works.| blog.codacy.com
This article discusses what clean code is and why it's essential and provides principles and best practices for writing clean and maintainable code.| blog.codacy.com