...
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC02-J | medium | likely | high | P6 | L2 |
Automated Detection
Identifying sensitive information requires assistance from the programmer; fully-automated identification of sensitive information is beyond the current state of the art.
If we had user-provided tagging of sensitive information, we could do some kind of escape analysis on the doPrivileged
blocks and perhaps prove that nothing sensitive leaks out of them. We could even use something akin to thread coloring to identify the methods that either must (or must not) be called from doPrivileged
blocks.The step that will certainly resist automated detection is identifying sensitive information in the first place. This is essentially guaranteed to require assistance from the programmer.
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
...