Prevent C checkers |
CERT C Secure Coding Standard |
---|
BAD_COMPARE |
|
BAD_FREE |
|
CHAR_IO |
[ FIO34-C. Use int to capture the |
CHECKED_RETURN |
[ FIO33-C. Detect and handle input output |
DEADCODE |
[ MSC07-A. Detect and remove dead code |
FORWARD_NULL |
[ EXP34-C. Ensure a pointer is valid before |
MISSING_RETURN |
[ MSC02-A. Avoid errors of omission > |
NEGATIVE_RETURNS |
[ INT31-C. Ensure that integer conversions |
NO_EFFECT |
[ No equivalent |
NULL_RETURNS |
[ EXP34-C. Ensure a pointer is valid |
OVERRUN_STATIC |
[ STR34-C. Do not copy data from an |
OVERRUN_DYNAMIC |
[ STR34-C. Do not copy data from an |
RESOURCE_LEAK |
[ MEM31-C. Free dynamically allocated memory |
RETURN_LOCAL |
[ DCL30-C. Do not refer to an object |
REVERSE_INULL EXP34-C. Ensure a pointer is valid |
|
REVERSE_NEGATIVE |
[ INT31-C. Ensure that integer conversions do |
SIZECHECK |
[ No equivalent |
STACK_USE |
[ MEM05-A. Avoid large stack allocations |
UNINIT |
[ EXP33-C. Do not reference |
UNUSED_VALUE |
[ No equivalent |
USE_AFTER_FREE |
[ MEM30-C. Do not access freed memory |
VARARGS |
[ (preview) No equivalent |
(1) MSC02-A is a superset of 6.1.1 but we could break this out into a rule
(2) 6.1.4 is a pattern checker, FIO33-C list specific functions that
need to be checked
(3) 6.1.6 , 6.1.10, and 6.1.15 all check for cases covered under EXP34-C