SonarQube 9.9 LTS Secrets Rules

Make sure to tell us:

  • What version are you upgrading from?
    8.9 LTS to 9.9LTS
  • System information (Operating system, Java version, Database provider/version)
    EC2 Linux, Java 17, Postgres

Question the GitHub code scanning alerts for security vulnerabilities set up are using only these 7 rules?


No, it should be all the Vulnerability rules in your Quality Profile.


Hi @ganncamp,

Thank you for the clarification.
Are the GitHub code scanning alerts set up for the individual repository? or once we set it up it applies to all the existing and new repositories?

Also, I am not getting this screenshot part what do I have to upload here? the same private key I have to upload which I get for PR decoration?


The docs should help.


I did not see those questions answers in the document, that’s why I asked those questions


On the GitHub side, you add a Webhook URL for your SonarQube instance, and configure a secret

  1. Set a Webhook secret (see GitHub’s webhook security recommendations).

Then you configure that secret into SonarQube

  1. Enter the webhook secret defined in your GitHub App.