Contents
Introduction
This coding standard consists of rules and recommendations, collectively referred to as guidelines. Rules are meant to provide normative requirements for code, whereas recommendations are meant to provide guidance that, when followed, should improve the safety, reliability, and security of software systems. However, a violation of a recommendation does not necessarily indicate the presence of a defect in the code.
Rules
Rules must meet the following criteria:
- Violation of the guideline is likely to result in a defect that may adversely affect the safety, reliability, or security of a system, for example, by introducing a security flaw that may result in an exploitable vulnerability.
- The guideline does not rely on source code annotations or assumptions.
- Conformance to the guideline can be determined through automated analysis (either static or dynamic), formal methods, or manual inspection techniques.
Rules are identified by the label rule.
Recommendations
Recommendations are suggestions for improving code quality. Guidelines are defined to be recommendations when all of the following conditions are met:
- Application of a guideline is likely to improve the safety, reliability, or security of software systems.
- One or more of the requirements necessary for a guideline to be considered a rule cannot be met.
The set of recommendations that a particular development effort adopts depends on the requirements of the final software product. Projects with stricter requirements may decide to dedicate more resources to ensuring the safety, reliability, and security of a system and consequently are likely to adopt a broader set of recommendations.
Recommendations are identified by the label recommendation.
Noncompliant Code Examples and Compliant Solutions
Noncompliant code examples illustrate code that violates the guideline under discussion. It is important to note that these are only examples, and eliminating all occurrences of the example does not necessarily mean that the code being analyzed is now compliant with the guideline.
Noncompliant code examples are typically followed by compliant solutions, which show how the noncompliant code example can be recoded in a secure, compliant manner. Except where noted, noncompliant code examples should contain violations only of the guideline under discussion. Compliant solutions should comply with all of the secure coding rules but may on occasion fail to comply with a recommendation.
Exceptions
Any rule or recommendation may specify a small set of exceptions detailing the circumstances under which the guideline is not necessary to ensure the safety, reliability, or security of software. Exceptions are informative only and are not required to be followed.
Identifiers
Each rule and recommendation is given a unique identifier. These identifiers consist of three parts:
- a three-letter prefix that represents the topic the rule/recommendation belongs to
- a two-digit numeric value in the range of 00-99
- a suffix that represents the associated language or platform
Numeric values in the range of 00-49 are reserved for recommendations, while values in the range of 50-99 are reserved for rules. (The values used for C are different. It uses 00-29 for recommendations and 30-99 for rules.)
Examples
Here are some example identifiers with an explanation of each:
INT50-CPP Do not cast to an out-of-range enumeration value
“INT” stands for the Integer category
“50” is the unique identifier
“-CPP” stands for the C++ language
EXP00-J Do not ignore values returned by methods
“EXP” stands for the Expressions category
“00” is the unique identifier
“-J” stands for the Java language
INT02-A Do not act on malicious intents
“INT” stands for the Intent category
“02” is the unique identifier
“-A” stands for the Android platform
Supported Languages and Platforms
See the table below for a summary of the current languages and platforms we currently support:
Suffix | Language/Platform |
-A | Android |
-C | C |
-CPP | C++ |
-J | Java |
-P | Perl |