Sonar Research

806 Followers
3 Following
186 Posts
Cutting-edge security research by Sonar to educate the world about code security across all software.
bloghttps://www.sonarsource.com/blog/
twitterhttps://twitter.com/Sonar_Research
Attending #Insomnihack this week? Don't miss our researcher @pspaul breaking down various unsafe patterns attackers can abuse to compromise your GitHub Actions workflows!
Our team is hiring! If you are passionate about finding bugs in code, exploiting them in creative ways, and sharing your findings on our blog, apply here: https://jobs.lever.co/sonarsource/06d335cb-8235-4372-9413-e60253ec530a
Sonar - Vulnerability Researcher (f/m/d)

Who is Sonar? Sonar helps prevent code quality and code security issues from reaching production, amplifies developers' productivity in concert with AI assistants, and improves the developer experience with streamlined workflows. Sonar analyzes all code, regardless of who writes it — your internal team, genAI, or third parties — resulting in more secure, reliable, and maintainable applications. Rooted in the open source community, Sonar’s solutions support over 30 programming languages, frameworks, and infrastructure technologies. Today, Sonar is trusted by +7M developers worldwide, including teams at the DoD, Microsoft, NASA, MasterCard, Siemens, and T-Mobile. We believe in developing great products that are supported by great internal teams and a strong culture. We are highly committed to and obsessed with the company, users, each other, and our open source community. We have high standards and hold each other accountable for acting with positivity, dedication, thoughtfulness, em

🧟 A fixed vulnerability that comes back to life?

This could have happened in GitHub Actions until yesterday! Learn how attackers could have exploited seemingly fixed workflow vulnerabilities:

https://www.sonarsource.com/blog/zombie-workflows-a-github-actions-horror-story?utm_medium=social&utm_source=mastodon&utm_campaign=research&utm_content=social-zombie-workflows-251209-&utm_term=---&s_category=Organic&s_source=Social%20Media&s_origin=social

#appsec #security #vulnerability

Zombie Workflows: A GitHub Actions horror story

Our research team recently discovered an exploitable pattern in GitHub Actions that lets attackers exploit seemingly fixed vulnerabilities.

From bit flip to RCE in Ollama! 🦙

Our latest blog post explains how a file parsing bug led to an interesting out-of-bounds write primitive. Learn how it could have been exploited in Ollama, a tool to run LLMs locally:

https://www.sonarsource.com/blog/ollama-remote-code-execution-securing-the-code-that-runs-llms/?utm_medium=social&utm_source=twitter&utm_campaign=research&utm_content=blog-ollama-vuln-251104-&utm_term=---&s_category=Organic&s_source=Social%20Media&s_origin=social

#security #vulnerability #llm #ai

Ollama Remote Code Execution: Securing the Code That Runs LLMs

Our Vulnerability Researchers uncovered vulnerabilities in the code of Ollama, a popular tool to run LLMs locally. Dive into the details of how LLMs are implemented and what can go wrong.

Securing GitHub Actions With SonarQube: Real-World Examples

This blog introduces SonarQube's enhanced analysis capabilities for GitHub Actions, designed to proactively identify and remediate security vulnerabilities like Command Injection and Code Execution that pose a significant supply chain risk.

Code Security for Conversational AI: Uncovering a Zip Slip in EDDI

Learn how SonarQube identified a Zip Slip vulnerability (CVE-2025-32779) in EDDI, an open-source conversational AI middleware.

Securing Go Applications With SonarQube: Real-World Examples

Take a deep dive into some vulnerabilities in Go applications and understand how SonarQube Cloud helps developers detect and mitigate them during the development cycle.

📱 Ever wondered what vulnerabilities look like in Android apps?

We have 2 real-world examples for you! From simple misconfig to cross-app data flow, learn how vulnerabilities manifest in the Kotlin code of Android apps:

https://www.sonarsource.com/blog/securing-kotlin-apps-with-sonarqube-real-world-examples/?utm_medium=social&utm_source=mastodon&utm_campaign=research&utm_content=blog-kotlin-real-world-vulns-250715-1&utm_term=---all&s_category=Organic&s_source=Social%20Media&s_origin=social

#appsec #security #vulnerability

Securing Kotlin Apps With SonarQube: Real-World Examples

Explore how real-world vulnerabilities look in the Kotlin code of Android apps and see how SonarQube helps detect them.

🔓⏫ After compromising every endpoint within an organization, our “Caught in the FortiNet” blog series comes to an end with one more thing.
Read more about FortiClient's XPC mistake that allows local privilege escalation to root on macOS:

https://www.sonarsource.com/blog/caught-in-the-fortinet-how-attackers-can-exploit-forticlient-to-compromise-organizations-3-3?utm_medium=social&utm_source=mastodon&utm_campaign=research&utm_content=blog-caught-in-the-fortinet-080725-&utm_term=&s_category=Organic&s_source=Social%20Media&s_origin=social

#appsec #security #vulnerability

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (3/3)

In the last blog of this series, we will focus back on FortiClient and learn how the inner workings of this application work, and what crucial mistake happened that led to us uncovering a local privilege escalation vulnerability. 

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations (2/3)

We recently discovered critical vulnerabilities in Fortinet’s endpoint protection solution that enable attackers to fully compromise organizations with minimal user interaction. In this second article, we will cover how attackers can use the compromised endpoint to achieve lateral movement within an organization.