This rule is a stub.
Several guidelines are instances of this one, including ERR01-J. Do not allow exceptions to expose sensitive information, DRD00. Do not store sensitive information on external storage (SD card) unless encrypted first, and DRD11. Ensure that sensitive data is kept secure.
Noncompliant Code Example
This noncompliant code example shows an example where ...
Code Block | ||||
---|---|---|---|---|
| ||||
Compliant Solution
In this compliant solution, ...
Code Block | ||
---|---|---|
| ||
| ||
Risk Assessment
Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|
MSC25- |
C | Medium |
Probable | High |
P4 |
L3 |
Automated Detection
Tool | Version | Checker | Description |
---|
CodeSonar |
|
|
|
BADMACRO.WEAK_CRYPTO | Use of Weak Cryptographic Algorithm Weak Cryptography |
Related Guidelines
SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms |