# Rules and languages

The Sonar rules catalog is the entry point where you can discover all the existing rules. While running an analysis, SonarQube for IDE raises an issue every time a piece of code breaks a coding rule. Software quality classification and severity show the impact of the issue on your code. To see a full list of Sonar rules, check the **Rules** page of your SonarQube Server instance or in your SonarQube Cloud organization.

See [software-qualities](https://docs.sonarsource.com/sonarqube-for-vs-code/using/software-qualities "mention") for more information.

## Overview <a href="#overview" id="overview"></a>

SonarQube for VS Code currently supports the following programming languages:

![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) **Supported out of the box**: SonarQube for IDE automatically checks your code in these languages and formats.\
![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) **Connected Mode required**: Running in [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") with SonarQube (Server, Cloud) or SonarQube Community Build unlocks analysis for these languages and formats.

| Language                          |                                                                                                                                                                                                                                          |
| --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Apex rules                        | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Azure Resource Manager rules      | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| C rules                           | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| C++ rules                         | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| C# rules                          | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| COBOL rules                       | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| CSS rules                         | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Go rules                          | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| HTML rules                        | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Java rules                        | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| JavaScript rules                  | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| PHP rules                         | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| PL/SQL rules                      | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Python and IPython notebook rules | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Secrets detection rules           | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Text                              | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| TypeScript rules                  | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| T-SQL rules                       | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| XML                               | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |

In addition, SonarQube for VSCode supports the IaC domains for:

| Language       |                                                                                                                                                                                                                                          |
| -------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Ansible        | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| CloudFormation | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Docker         | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| GitHub Actions | ![a](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Kubernetes     | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Terraform      | ![r](https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |

The full list of available rules can be found in the VS Code UI. See the article below about [#using-sonar-rules](#using-sonar-rules "mention") for details. Open the [#supported-language-versions](#supported-language-versions "mention") expandable to learn how to see which versions are supported for a given language.

<details>

<summary>Supported language versions</summary>

SonarQube for VS Code provides analysis for several languages. Support for your language may vary depending on the SonarQube for IntelliJ version you’re running.

For language-specific properties and supported language versions, refer to the relevant language pages in the SonarQube (Server, Cloud) or SonarQube Community Build docs directly; the same Sonar language analyzers are used by the servers are used by SonarQube for IntelliJ.

* [Languages](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/analyzing-source-code/languages "mention") in SonarQube Server
* [Languages](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/analyzing-source-code/languages "mention") in SonarQube Cloud
* [Languages](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/analyzing-source-code/languages "mention") in SonarQube Community Build

</details>

There are commercial-level rules available in SonarQube Cloud (all plans) and in SonarQube Server. For these rules to appear in SonarQube for IDE, it must be in connected mode. See [#commercial-level-rules](#commercial-level-rules "mention") for more information.

For more details about languages and new features under consideration for VS Code, check out the [SonarQube for IDE roadmap](https://portal.productboard.com/sonarsource/4-sonarlint/tabs/8-under-consideration) where we list our *coming soon* and *newly released* features.

## Sonar Rule Descriptions <a href="#sonar-rule-descriptions" id="sonar-rule-descriptions"></a>

Simply right-click an issue in the **PROBLEMS** Panel, and choose **SonarQube: Show issue details for \`…\`** to open the **SonarQube Rule Description** webview. Here you will find a brief explanation of the rule, along with a noncompliant and compliant code example. For more information, see the server documentation about quality profiles:

* [Managing quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles "mention") in SonarQube Server.
* [Managing quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles "mention") in SonarQube Cloud.

For some **SonarQube Rule Descriptions**, you can visualize a diff view for the noncompliant and compliant code sample, which should help you fix your issue.

<div align="left"><figure><img src="https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-a7edf67c17d320a6d97c66b4280d845857af256c%2F03c7a95217b90bbd9db9a3b43cec2e47e32056ef.png?alt=media" alt="The SonarQube Rule Description tab will give you lots of information to help you fix your issue."><figcaption></figcaption></figure></div>

An issue’s coding attribute, software qualities, and severity are found when opening the SonarQube Rule tab. Below the rule title, you will find the coding attributes that highlight an issue’s classification. Check the [glossary](https://docs.sonarsource.com/sonarqube-for-vs-code/resources/glossary "mention") for details about coding attributes, and the [software-qualities](https://docs.sonarsource.com/sonarqube-for-vs-code/using/software-qualities "mention") page to better understand how they help classify your issue.

<div align="left"><figure><img src="https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2Fgit-blob-ca9a4b669937a2320e3455022d1c3b7941ca8d1f%2F42237e013ce89749beb19dcdee42cf66ada8a984.png?alt=media" alt="Coding attributes and software qualities appear in the SonarQube Rule Description view. Your actual view may be different because when running in connected mode with SonarQube Server, the server&#x27;s mode is respected." width="375"><figcaption></figcaption></figure></div>

**When in Connected Mode**

If you’re running SonarQube for VS Code while in connected mode *with SonarQube Server or SonarQube Community Build*, your view will change according to the server settings. Standard Experience mode encompasses the use of rule types such as bugs, code smells, and vulnerabilities. Alternatively, if SonarQube Server is set to Multi-Quality Rule mode, you will more accurately represent the impact an issue has on all software qualities.

Please see the pages about the MQR mode and Standard Experience for detailed information about the available rule modes for your instance:

* [Choosing a mode for your instance](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/instance-administration/analysis-functions/instance-mode "mention") in SonarQube Server
* [Choosing a mode for your instance](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/instance-administration/analysis-functions/instance-mode "mention") in SonarQube Community Build

## Applying rules while in connected mode <a href="#applying-rules-while-in-connected-mode" id="applying-rules-while-in-connected-mode"></a>

Connected mode syncs your SonarQube (Server, Cloud) or SonarQube Community Build quality profile with the local analysis to suppress issues reported in the IDE. See the [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") documentation for more information.

## Language-specific requirements <a href="#language-specific-requirements" id="language-specific-requirements"></a>

See the [#language-specific-requirements](https://docs.sonarsource.com/sonarqube-for-vs-code/getting-started/requirements#language-specific-requirements "mention") on the [requirements](https://docs.sonarsource.com/sonarqube-for-vs-code/getting-started/requirements "mention") page.

## Rules for AI CodeFix <a href="#rules-for-ai-codefix" id="rules-for-ai-codefix"></a>

A select set of rules are eligible for AI CodeFix when running in connected mode. Please see the [#ai-codefix-rules](https://docs.sonarsource.com/sonarqube-for-vs-code/ai-capabilities/ai-codefix#ai-codefix-rules "mention") article for a full list.

## Other rule types <a href="#other-rule-types" id="other-rule-types"></a>

<details>

<summary>DBD rules</summary>

Dataflow bugs are a set of *complex Python and Java bugs that are only detected when reviewing all feasible execution paths*. This type of issue can cause runtime errors and crashes in Python and Java. If you want to learn more, check out [our blog post](https://www.sonarsource.com/blog/sonarqube-99-lts-python-developers/#new-bugdetection-rules-track-dataflow-with-symbolic-execution) for a good explanation with an example.

Dataflow Bug Detection (DBD) rules for Python and Java are supported in [Commercial editions of SonarQube Server](https://www.sonarsource.com/products/sonarqube/downloads/). At this time, SonarQube for VS Code supports DBD detection for Python when running in connected mode with SonarQube Server Active versions; support for DBD detection in Java is under development.

</details>

<details>

<summary>Injection vulnerabilities</summary>

Security vulnerabilities requiring taint engine analysis ([taint-vulnerabilities](https://docs.sonarsource.com/sonarqube-for-vs-code/using/taint-vulnerabilities "mention")) are only available in connected mode because SonarQube for IDE pulls them from SonarQube (Server, Cloud) following a project analysis.

To browse injection vulnerabilities in SonarQube for VS Code, configure [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") with your SonarQube Server or SonarQube Cloud instance. Once you [#configure-your-binding](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/setup#configure-your-binding "mention"), SonarQube for IDE will synchronize with SonarQube (Server, Cloud) to report the detected injection vulnerabilities.

More information about security-related rules is available in the server documentation:

* [Security-related rules](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-rules/security-related-rules "mention") in SonarQube Server
* [Security-related rules](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-rules/security-related-rules "mention") in SonarQube Cloud

</details>

<details>

<summary>Security hotspots</summary>

In SonarQube for VS Code 3.14 and above, local detection of Sonar Security Hotspots is enabled if you are using [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") with SonarQube Server 2025.1+, SonarQube Cloud, or SonarQube Community Build.

Please see the SonarQube for IDE documentation on [security-hotspots](https://docs.sonarsource.com/sonarqube-for-vs-code/using/security-hotspots "mention") for more details.

</details>

<details>

<summary>Secrets detection</summary>

Secrets are pieces of user-specific or system-level credentials that should be protected and accessible to legitimate users only. SonarQube for IDE detects exposed Secrets in your source code and language-agnostic config files. When running in connected mode, the SonarQube (Server, Cloud) or SonarQube Community Build quality profiles are applied to locally detected Secrets.

</details>

<details>

<summary>Commercial-level rules</summary>

There are commercial-level rules that are only available in SonarQube Cloud (all plans) and SonarQube Server. The list of Sonar rules available found on the **Rules** page of your SonarQube Server Developer, Enterprise, and Data Center editions or in your SonarQube Cloud organization may be different than what you see in the IDE.

In order for these rules to appear in SonarQube for IDE, it must be in connected mode. In the standalone mode these rules are not visible. See [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") for more information.

Commercial-level rules are not available in SonarQube for Community Build.

</details>

## **Using Sonar rules**

When not running in connected mode (also known as *standalone mode*), all Sonar rules for your language can be configured in the IDE. In addition, some Sonar rules have parameters that you can modify. Here are a few reasons you might want to edit a rule locally:

* Disable a rule that is enabled by default. Maybe the rule doesn't apply to your specific project. See [#rule-selection](#rule-selection "mention") for more information.
* Enable a rule that is disabled by default. By reviewing which rules are disabled, you might notice that some rules could be useful in the context of your project. See [#rule-selection](#rule-selection "mention") for more information.
* To improve a rule. In some cases rules have parameters. For example, regarding cognitive complexity, you can customize the threshold at which the rule will raise issues. See [#edit-rules](#edit-rules "mention") for more information.

### Rule selection <a href="#rule-selection" id="rule-selection"></a>

The full list of available rules is found by navigating to the **SONARQUBE SETUP** > **RULES** view in the VS Code Activity Bar. There, Sonar Rules can individually be toggled on or off while running SonarQube for IDE in standalone mode; each rule is clearly marked as *on* or *off*, and it’s possible to filter the visible list by an **Active**, **All**, and **Inactive** status.

When your project is bound to SonarQube Server or SonarQube Cloud using [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention"), the rule set is managed on the server side as defined by the quality profile. See [#applying-rules-while-in-connected-mode](#applying-rules-while-in-connected-mode "mention"), for details.

{% hint style="info" %}
When a project is bound to a SonarQube (Server, Cloud) or SonarQube Community Build, the **RULES** view is not visible in the UI. In this case, the rules configuration from the server applies. For more information, see the server documentation about quality profiles to edit rules:

* [Managing quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles "mention") in SonarQube Cloud
* [Managing quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles "mention") in SonarQube Server
  {% endhint %}

## Edit rules

To edit a rule in SonarQube for VS Code, navigate to the **SONARQUBE SETUP** > **RULES** view and select the rule you want to edit. Select or deselect any rule in the list to enable or disable it. If a rule has options, you’ll see them at the bottom of the rule description.

1. Navigate to the **SONARQUBE SETUP** > **RULES** view.
2. Select any rule to open the rule description. Use the filter if desired, or under the three-dots there’s an option to select **Find Rule By Key**.
3. Look for **Parameters** at the bottom of the rule description. In the screenshot below, giraffes are added to the list of at-rules to ignore in rule css:S4662. When edited, the parameters will show both the *Current value* and the *Default value*.
4. To edit a rule, navigate to **Settings…** > **Extensions** > **SonarLint** > **User** menu, search for `Sonarlint: rules`, and select the **Edit in settings.json** link to open. The code sample provided in the User settings shows two examples: to turn rule javascript:S1481 “off”, and to edit the maximum line length checked by javascript:S103.

<div align="left"><figure><img src="https://3457378997-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6LPRABg3ubAJhpfR5K0Y%2Fuploads%2FPfCHXp9HCCmtGA93cu7d%2Fsq-vscode-edit-rules.png?alt=media&#x26;token=129105a2-fea5-41cd-89c8-11401a7cf531" alt="Sonar rules are accessible in the SONARQUBE SETUP view container." width="563"><figcaption></figcaption></figure></div>

{% hint style="info" %}
When a project is bound to a SonarQube (Server, Cloud) or SonarQube Community Build, the **RULES** view is not visible in the UI. In this case, the rules configuration from the server applies. For more information, see the server documentation about quality profiles to edit rules:

* [Managing quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles "mention") in SonarQube Cloud
* [Managing quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles "mention") in SonarQube Server
  {% endhint %}

## **Unsupported rules**

Some rules are simply too advanced to run locally, in SonarQube for IDE. Because some rules report issues at the project level, apply to the architecture of your code base, or require extensive resources to analyze, they are not included when SonarQube for IDE runs an analysis. Unsupported rule types include architecture, injection vulnerabilities, and some advanced bug detection rules.

However, these advanced issues will be reported in the IDE when you are running in connected mode with SonarQube (Server, Cloud) or SonarQube Community Build. See these links for more information:

* Sonar [Architecture](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/architecture "mention") in SonarQube Cloud
* [taint-vulnerabilities](https://docs.sonarsource.com/sonarqube-for-vs-code/using/taint-vulnerabilities "mention") in SonarQube for VS Code
* [#commercial-level-rules](#commercial-level-rules "mention") and [#dbd-rules](#dbd-rules "mention")

## Rules while in Connected Mode <a href="#applying-rules-while-in-connected-mode" id="applying-rules-while-in-connected-mode"></a>

Connected Mode syncs your SonarQube Server or SonarQube Cloud Quality Profile with the local analysis to suppress issues reported in the IDE. Therefore, when running in Connected Mode, SonarQube for VS Code will ignore rule settings that are defined locally. See the [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") page for more information about running connected mode and the [#benefits](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode#benefits "mention") it brings when working in teams.

### Edit rules in connected mode

If you’re running in [connected-mode](https://docs.sonarsource.com/sonarqube-for-vs-code/connect-your-ide/connected-mode "mention") with SonarQube (Server, Cloud) or SonarQube Community Build, you can share customized active rules with your team because you’ll all be using the same quality profile to share rule sets. Please see the relevant instructions for the server you are connecting to:

* [Understanding quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Cloud
* [Understanding quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Server
* [Understanding quality profiles](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/quality-standards-administration/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Community Build
