...
- Violation of the coding practice is likely to result in a security flaw that may result in an exploitable vulnerability.
- Conformance to the coding practice can be determined through automated analysis (either static or dynamic), formal methods, or manual inspection techniques.
...