...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
DCL06-C | Low | Unlikely | Medium | P2 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Axivion Bauhaus Suite |
| CertC-DCL06 | |||||||
Compass/ROSE | Could detect violations of this recommendation merely by searching for the use of "magic numbers" and magic strings in the code itself. That is, any number (except a few canonical numbers: −1, 0, 1, 2) that appears in the code anywhere besides where assigned to a variable is a magic number and should instead be assigned to a | ||||||||
| CC2.DCL06 | Fully implemented | |||||||
LDRA tool suite |
| 201 S | Fully implemented | ||||||
Parasoft C/C++test |
| CERT_C-DCL06-a | "#define" or enum constants should be used instead of hard coded values whenever possible | ||||||
Polyspace Bug Finder |
| Size of memory buffer is a numerical value instead of symbolic constant Loop boundary is a numerical value instead of symbolic constant | |||||||
PRQA QA-C |
| 3120 |
, 3121 |
, 3122, 3123 |
, 3131 |
, 3132 | Partially implemented | ||||||||
PRQA QA-C++ |
| 4400, 4401, 4402, 4403, 4404, 4405, 4406, 4408, 4409, 4414, 4415 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...