Recommendations
MET00-J. Understand the difference between overriding and hiding
...
MET06-J. Methods that perform a security check must be declared private or final
Rules
MET30-J. Follow the general contract while overriding the equals method
...
MET39-J. Do not use the clone method to copy untrusted method parameters
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
MET00- J | low | unlikely | medium | P2 | L3 |
MET01- J | low | unlikely | high | P1 | L3 |
MET02- J | low | unlikely | high | P1 | L3 |
MET03- J | low | unlikely | high | P1 | L3 |
MET04- J | medium | probable | medium | P8 | L2 |
MET05- J | medium | probable | medium | P8 | L2 |
MET06- J | medium | probable | medium | P8 | L2 |
Rules
Rules | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
MET30- J | low | unlikely | medium | P2 | L3 |
MET31- J | low | unlikely | high | P1 | L3 |
MET32- J | medium | probable | medium | P8 | L2 |
MET33- J | low | unlikely | high | P1 | L3 |
MET34- J | medium | unlikely | medium | P4 | L3 |
...