C checkers | CERT C Secure Coding Standard |
---|
BAD_COMPARE | MSC02-A. Avoid errors of omission |
BAD_FREE | MEM34-C. Only free memory allocated dynamically |
CHAR_IO | FIO34-C. Use int to capture the return value of character IO functions |
CHECKED_RETURN | FIO33-C. Detect and handle input output errors resulting in undefined behavior |
DEADCODE | MSC07-A. Detect and remove dead code |
FORWARD_NULL | EXP34-C. Ensure a pointer is valid before dereferencing it |
MISSING_RETURN | MSC02-A. Avoid errors of omission |
NEGATIVE_RETURNS | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
NO_EFFECT | MSC12-A. Detect and remove code that has no effect |
NULL_RETURNS | EXP34-C. Ensure a pointer is valid before dereferencing it |
OVERRUN_STATIC | STR34-C. Do not copy data from an unbounded source to a fixed-length array |
OVERRUN_DYNAMIC | STR34-C. Do not copy data from an unbounded source to a fixed-length array |
RESOURCE_LEAK | MEM31-C. Free dynamically allocated memory exactly once |
RETURN_LOCAL | DCL30-C. Do not refer to an object outside of its lifetimeDeclare objects with appropriate storage durations |
REVERSE_INULL | EXP34-C. Ensure a pointer is valid before dereferencing it |
REVERSE_NEGATIVE | INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
SIZECHECK | MEM35-C. Allocate sufficient memory for an object |
STACK_USE | MEM05-A. Avoid large stack allocations |
UNINIT | EXP33-C. Do not reference uninitialized variables |
UNUSED_VALUE | MSC13-A. Detect and remove unused values |
USE_AFTER_FREE | MEM30-C. Do not access freed memory, MEM31-C. Free dynamically allocated memory exactly once |
VARARGS | No equivalent |