...
Name reuse makes code more difficult to read and maintain. This can result in security weaknesses.
Guideline Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP15DCL15-J | low | unlikely | medium | P2 | L3 |
Automated Detection
An automated tool can easily detect reuse of names in containing scopes.
...