Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

CERT Rule

Related Guidelines

IDS04-JGuideline 1-1 / DOS-1: Beware of activities that may use disproportionate resources
OBJ01-JGuideline 6-8 / MUTABLE-8: Define wrapper methods around modifiable internal state
OBJ02-JGuideline 4-6 / EXTEND-6: Understand how a superclass can affect subclass behavior
OBJ04-JGuideline 6-4 / MUTABLE-4: Support copy functionality for a mutable class
OBJ06-JGuideline 6-2 / MUTABLE-2: Create copies of mutable output values
OBJ10-JGuideline 6-10 / MUTABLE-10: Ensure public static final field values are constants
OBJ11-JGuideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods
OBJ11-JGuideline 7-3 / OBJECT-3: Defend against partially initialized instances of non-final classes
MET04-JGuideline 4-1 / EXTEND-1: Limit the accessibility of classes, interfaces, methods, and fields
MET05-JGuideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden
SER03-JGuideline 8-2 / SERIAL-2: Guard sensitive data during serialization
SER04-JGuideline 8-4 / SERIAL-4: Duplicate the SecurityManager checks enforced in a class during serialization and deserialization
SER07-JGuideline 8-3 / SERIAL-3: View deserialization the same as object construction
SER09-JGuideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden
SEC00-JGuideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged
SEC01-JGuideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged
SEC05-JGuideline 9-10 / ACCESS-10: Be aware of standard APIs that perform Java language access checks against the immediate caller
JNI00-JGuideline 5-3 / INPUT-3: Define wrappers around native methods
OBJ58-JGuideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods