...
- Reuse the name of a superclass
- Reuse the name of an interface
- Reuse the name of a field defined in a superclass
- Reuse the name of a field that appears in a different scope within the same method
- Reuse the name of a field, type, or another parameter across packages
Noncompliant Code Example (Class Name)
This noncompliant code example implements a class that reuses the name of the class java.util.Vector
. It attempts to introduce a different condition for the isEmpty()
method for interfacing with native legacy code, by overriding the corresponding method in java.util.Vector
.
...
Code Block | ||
---|---|---|
| ||
class Vector { private int val = 1; public boolean isEmpty() { if(val == 1) { //compares with 1 instead of 0 return true; } else { return false; } } //other functionality is same as java.util.Vector } // import java.util.Vector; omitted public class VectorUser { public static void main(String[] args) { Vector v = new Vector(); if(v.isEmpty()) { System.out.println("Vector is empty"); } } } |
Compliant Solution (Class Name)
This compliant solution declares the class Vector
with a different name.
...
Wiki Markup |
---|
Note: When the developer and organization control the original hidden class, in addition to the code being written, it may be preferable to change the design strategy of the original in accordance with Bloch's _Effective Java_ \[[Bloch 2008|AA. Bibliography#Bloch 08]\] "Item 16: Prefer interfaces to abstract classes." Changing the original class into an interface would permit class {{MyVector}} to declare that it implements the hypothetical {{Vector}} interface. This would permit client code that intended to use {{MyVector}} to remain compatible with code that uses the original implementation of {{Vector}}. |
Noncompliant Code Example (Field Shadowing)
This noncompliant code example reuses the name of the val instance field in the scope of an instance method. This behavior can be classified as shadowing.
Code Block | ||
---|---|---|
| ||
class MyVector { private int val = 1; private void doLogic() { int val; //... } } |
Compliant Solution (Field Shadowing)
This solution eliminates shadowing by changing the name of the variable defined in method scope.
Code Block | ||
---|---|---|
| ||
class MyVector { private int val = 1; private void doLogic() { int newValue; //... } } |
Exceptions
SCP02-EX1: Reuse of names is permitted for trivial loop counter declarations in the same scope:
Code Block | ||
---|---|---|
| ||
for(int i = 0; i < 10; i++) { } for(int i = 0; i < 20; i++) { } |
Risk Assessment
Name reuse makes code more difficult to read and maintain. This can result in security weaknesses.
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SCP02-J | low | unlikely | medium | P2 | L3 |
Automated Detection
An automated tool can easily detect reuse of names whose earlier definition appears somewhere in the Java include path. FindBugs, for example, detects at least four sub-instances of this guideline.
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
Related Guidelines
C Secure Coding Standard: DCL01-C. Do not reuse variable names in subscopes
C++ Secure Coding Standard: DCL01-CPP. Do not reuse variable names in subscopes
Bibliography
Wiki Markup |
---|
\[[JLS 2005|AA. Bibliography#JLS 05]\] [Section 6.3.2|http://java.sun.com/docs/books/jls/third_edition/html/names.html#6.3.2] "Obscured Declarations", [Section 6.3.1|http://java.sun.com/docs/books/jls/third_edition/html/names.html#6.3.1] "Shadowing Declarations", [Section 7.5.2|http://java.sun.com/docs/books/jls/third_edition/html/packages.html#7.5.2] "Type-Import-On_Demand Declaration", [Section 14.4.3|http://java.sun.com/docs/books/jls/third_edition/html/statements.html#14.4.3] "Shadowing of Names by Local Variables" \[[Bloch 2005|AA. Bibliography#Bloch 05]\] Puzzle 67: All Strung Out \[[Bloch 2008|AA. Bibliography#Bloch 08]\] Item 16: Prefer interfaces to abstract classes \[[Kabanov 2009|AA. Bibliography#Kabanov 09]\] \[[Conventions 2009|AA. Bibliography#Conventions 09]\] 6.3 Placement \[[FindBugs 2008|AA. Bibliography#FindBugs 08]\]: |
...