Info | ||
---|---|---|
| ||
This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly. |
Version number:
V. 5.0
C++ Checkers | CERT C++ Secure Coding Standard |
---|---|
BAD_OVERRIDE | No equivalent |
CTOR_DTOR_LEAK | No equivalent |
DELETE_ARRAY | No equivalent |
INVALIDATE_ITERATOR | https://www.securecoding.cert.org/confluence/display/cplusplus/STL30-C.+Use+Valid+Iterators |
PASS_BY_VALUE | No equivalent |
UNCAUGHT_EXCEPT | |
UNINIT_CTOR | No equivalent |
WRAPPER_ESCAPE | No equivalent |
Concurrency Checkers | CERT C Secure Coding Standard |
---|---|
LOCK | Out of scope |
ORDER_REVERSAL | Out of scope |
SLEEP | Out of scope |
...
Security checkers
...
CERT C Secure Coding Standard
...
BUFFER_SIZE
...
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator, ARR33-C. Guarantee that copies are made into storage of sufficient size
...
CHROOT
...
Out of scope
...
OPEN_ARGS
...
FIO03-C. Do not make assumptions about fopen() and file creation
...
READLINK
...
POS30-C. Use the readlink() function properly
...
SECURE_CODING
...
STR35-C. Do not copy data from an unbounded source to a fixed-length array, others?
...
SECURE_TEMP
...
FIO43-C. Do not create temporary files in shared directories, TMPxx-C. Temporary file names must be unique when the file is created
...
STRING_OVERFLOW
...
...
STRING_NULL
...
STR32-C. Null-terminate byte strings as required
...
STRING_SIZE
...
...
TAINTED_SCALAR
...
VOID Guarantee that array indices are within the valid range, INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data, INT32-C. Ensure that operations on signed integers do not result in overflow
...
TAINTED_STRING
...
STR02-C. Sanitize data passed to complex subsystems, FIO30-C. Exclude user input from format strings, FIO02-C. Canonicalize path names originating from untrusted sources
...
TOCTOU
...
FIO03-C. Do not make assumptions about fopen() and file creation, FIO01-C. Be careful using functions that use file names for identification, FIO08-C. Take care when calling remove() on an open file, others?
...
USER_POINTER
...
>