 
                            ...
| Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| OBJ06-J | medium | probable | high | P4 | L3 | 
Automated Detection
TODO
Related Guidelines
| Secure Coding Guidelines for the Java Programming Language, Version 3.0 | Guideline 2-2 Create copies of mutable outputs | 
Bibliography
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e42ecf0830d350a6-5f84e438-43ad4813-a1eea558-35df31a9a94643223827ec95"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 39: Make defensive copies when needed | ]]></ac:plain-text-body></ac:structured-macro> | |||||
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="eaf3e962dad41401-10bb39f3-48e245f6-ae11bb3f-4a951bd7ff435df84840f865"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9b863f17-1166-49cf-a358-3b7f820c13c7"><ac:plain-text-body><![CDATA[ | [[SCG 2009 | AA. Bibliography#SCG 09]] | Guideline 2-2 Create copies of mutable outputs | ]]></ac:plain-text-body></ac:structured-macro> | 
...