You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

This page was automatically generated and should not be edited.

The information on this page was provided by outside contributors and has not been verified by SEI CERT.

Unable to render {include} The included page could not be found.

Checker

Guideline

CallToDeprecatedMethodMET02-J. Do not use deprecated or obsolete classes or methods
ObjectFinalizeCheckMET12-J. Do not use finalizers
ObjectFinalizeOverridenCallsSuperFinalizeCheckMET12-J. Do not use finalizers
ObjectFinalizeOverridenCheckMET12-J. Do not use finalizers
S106ERR02-J. Prevent exceptions while logging data
S112ERR07-J. Do not throw RuntimeException, Exception, or Throwable
S1143ERR04-J. Do not complete abruptly from a finally block
S1147ERR09-J. Do not allow untrusted code to terminate the JVM
S1163ERR05-J. Do not let checked exceptions escape from a finally block
S1166ERR00-J. Do not suppress or ignore checked exceptions
S1174MET12-J. Do not use finalizers
S1181ERR08-J. Do not catch NullPointerException or any of its ancestors
S1206MET09-J. Classes that define an equals() method must also define a hashCode() method
S1217THI00-J. Do not invoke Thread.run()
S1313MSC03-J. Never hard code sensitive information
S1444OBJ10-J. Do not use public static nonfinal fields
S1696ERR08-J. Do not catch NullPointerException or any of its ancestors
S1698EXP03-J. Do not use the equality operators when comparing values of boxed primitives
S1699MET05-J. Ensure that constructors do not call overridable methods
S1860LCK01-J. Do not synchronize on objects that may be reused
S1872OBJ09-J. Compare classes and not class names
S1943STR04-J. Use compatible character encodings when communicating string data between JVMs
S1989ERR01-J. Do not allow exceptions to expose sensitive information
S2057SER00-J. Enable serialization compatibility during class evolution
S2059SER05-J. Do not serialize instances of inner classes
S2061SER01-J. Do not deviate from the proper signatures of serialization methods
S2066SER05-J. Do not serialize instances of inner classes
S2068MSC03-J. Never hard code sensitive information
S2077IDS00-J. Prevent SQL injection
S2095FIO04-J. Release resources when they are no longer needed
S2111NUM10-J. Do not construct BigDecimal objects from floating-point literals
S2151MET12-J. Do not use finalizers
S2159EXP02-J. Do not use the Object.equals() method to compare two arrays
S2162MET08-J. Preserve the equality contract when overriding the equals() method
S2175EXP04-J. Do not pass arguments to certain Java Collections Framework methods that are a different type than the collection parameter type
S2201EXP00-J. Do not ignore values returned by methods
S2245MSC02-J. Generate strong random numbers
S2259EXP01-J. Do not use a null in a case where an object is required
S2274THI03-J. Always invoke wait() and await() methods inside a loop
S2276LCK09-J. Do not perform operations that can block while holding a lock
S2384OBJ05-J. Do not return references to private mutable class members
S2384OBJ06-J. Defensively copy mutable inputs and mutable internal components
S2386OBJ01-J. Limit accessibility of fields
S2445LCK00-J. Use private final lock objects to synchronize classes that may interact with untrusted code
S2446THI02-J. Notify all waiting threads rather than a single thread
S2653ENV06-J. Production code must not contain debugging entry points
S2674FIO10-J. Ensure the array is filled when using read() to fill an array
S3346EXP06-J. Expressions used in assertions must not produce side effects
S881EXP05-J. Do not follow a write by a subsequent write or read of the same object within an expression
  • No labels