Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: added (either static or dynamic)

...

  1. Violation of the coding practice is likely to result in a security flaw that may result in an exploitable vulnerability.
  2. Conformance to the coding practice can be determined through automated analysis (either static or dynamic), formal methods, or manual inspection techniques.

...