 
                            ...
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée | 
 | stdlib-use-rand | Fully checked | ||||||
| Axivion Bauhaus Suite | 
 | CertC-MSC30 | |||||||
| Clang | 
 | cert-msc30-c | Checked by clang-tidy | ||||||
| CodeSonar | 
 | BADFUNC.RANDOM.RAND | Use of rand | ||||||
| Compass/ROSE | |||||||||
| Coverity | 
 | DONTCALL | Implemented - weak support | ||||||
| 
 | CC2.MSC30 | Fully implemented | |||||||
| LDRA tool suite | 
 | 44 S | Enhanced enforcement | ||||||
| Parasoft C/C++test | 
 | CERT_C-MSC30-a | Do not use the rand() function for generating pseudorandom numbers | ||||||
| PC-lint Plus | 
 | 586 | Fully supported | ||||||
| Polyspace Bug Finder | 
 | CERT C: Rule MSC30-C | Checks for vulnerable pseudo-random number generator (rule fully covered) | ||||||
| PRQA QA-C | 
 | 5022 | Fully implemented | ||||||
| PRQA QA-C++ | 
 | 5029 | |||||||
| RuleChecker | 
 | stdlib-use-rand | Fully checked | ||||||
| Helix QAC | 
 | 
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...