...
CERT Rule | Related Guidelines |
---|---|
IDS04-J | Guideline 1-1 / DOS-1: Beware of activities that may use disproportionate resources |
OBJ01-J | Guideline 6-8 / MUTABLE-8: Define wrapper methods around modifiable internal state |
OBJ02-J | Guideline 4-6 / EXTEND-6: Understand how a superclass can affect subclass behavior |
OBJ04-J | Guideline 6-4 / MUTABLE-4: Support copy functionality for a mutable class |
OBJ06-J | Guideline 6-2 / MUTABLE-2: Create copies of mutable output values |
OBJ10-J | Guideline 6-10 / MUTABLE-10: Ensure public static final field values are constants |
OBJ11-J | Guideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods |
OBJ11-J | Guideline 7-3 / OBJECT-3: Defend against partially initialized instances of non-final classes |
MET04-J | Guideline 4-1 / EXTEND-1: Limit the accessibility of classes, interfaces, methods, and fields |
MET05-J | Guideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden |
SER03-J | Guideline 8-2 / SERIAL-2: Guard sensitive data during serialization |
SER04-J | Guideline 8-4 / SERIAL-4: Duplicate the SecurityManager checks enforced in a class during serialization and deserialization |
SER07-J | Guideline 8-3 / SERIAL-3: View deserialization the same as object construction |
SER09-J | Guideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden |
SEC00-J | Guideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged |
SEC01-J | Guideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged |
SEC05-J | Guideline 9-10 / ACCESS-10: Be aware of standard APIs that perform Java language access checks against the immediate caller |
JNI00-J | Guideline 5-3 / INPUT-3: Define wrappers around native methods |
OBJ58-J | Guideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods |