...
Tool | Version | Checker | Description | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 201 S | Fully implemented | ||||||||||||||||||||||||||||
Compass/ROSE |
|
| Could detect violations of this recommendation merely by searching for the use of "magic numbers" and magic strings in the code itself. That is, any number (except a few canonical numbers: −1, 0, 1, 2) that appears in the code anywhere besides where assigned to a variable is a magic number and should instead be assigned to a | |||||||||||||||||||||||||||
| nomagicc | Fully implemented. | ||||||||||||||||||||||||||||
PRQA QA-C |
| 3120 | Partially implemented | 3121 | 3122 | 3123 | 3131 | 3132 | 3132 | Partially implemented |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...