Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
Info
titleGenerated Content

This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly.

Version number:
V. 5.0

was automatically generated and should not be edited.

Note

The information on this page was provided by outside contributors and has not been verified by SEI CERT.

Tip

The table below can be re-ordered, by clicking column headers.

...

Include Page
Findbugs_V
Findbugs_V

Checker

Guideline

Java checkers

CERT Java Secure Coding Standard

MS_MUTABLE_ARRAY MS_SHOULD_BE_FINAL OBJ10-J. Do not use public static nonfinal variables - java - CERT Secure Coding Standardfields
Not Implemented VNA00-J. Ensure visibility when accessing shared primitive variables
NP_DEREFERENCE_OF_READLINE_VALUE EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required
NP_NULL_PARAM_DEREF EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required
NP_TOSTRING_COULD_RETURN_NULL EXP01-J. Never dereference null pointers - java - CERT Secure Coding StandardDo not use a null in a case where an object is required
SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE IDS00-J. Sanitize untrusted data passed across a trust boundary - java - CERT Secure Coding StandardPrevent SQL injection