...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Automated Detection
The tool Compass Rose is able to detect violations of this recommendation. Specifically, Rose reports use of tmpnam()
, tmpnam_s()
, tmpfile()
, and mktemp()
.
...