
...
Leaving extra entry points into production code could allow an attacker to gain special access to the program.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
---|---|---|---|---|---|---|
ENV06-J | High | Probable | No | NoLow | P18P6 | L1L2 |
Automated Detection
This rule is not amenable to automated static analysis.
...