Note | ||
---|---|---|
Info | ||
| ||
This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly. |
Version number:
V. 5.0
was automatically generated and should not be edited. |
Note |
---|
The information on this page was provided by outside contributors and has not been verified by SEI CERT. |
Tip |
---|
The table below can be re-ordered, by clicking column headers. |
...
Include Page | ||||
---|---|---|---|---|
|
Checker | Guideline | Java checkers | CERT Java Secure Coding Standard |
---|---|---|---|
MS_MUTABLE_ARRAY MS_SHOULD_BE_FINAL | OBJ10-J. Do not use public static nonfinal variables - java - CERT Secure Coding Standardfields | ||
Not Implemented | VNA00-J. Ensure visibility when accessing shared primitive variables | ||
NP_DEREFERENCE_OF_READLINE_VALUE | EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required | ||
NP_NULL_PARAM_DEREF | EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required | ||
NP_TOSTRING_COULD_RETURN_NULL | EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required | ||
SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | IDS00-J. Sanitize untrusted data passed across a trust boundary - java - CERT Secure Coding StandardPrevent SQL injection |