Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Recommendations

MET00-J. Understand the difference between overriding and hiding

...

MET06-J. Methods that perform a security check must be declared private or final

Rules

MET30-J. Follow the general contract while overriding the equals method

...

MET39-J. Do not use the clone method to copy untrusted method parameters

Risk Assessment Summary

Recommendations

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MET00- J

low

unlikely

medium

P2

L3

MET01- J

low

unlikely

high

P1

L3

MET02- J

low

unlikely

high

P1

L3

MET03- J

low

unlikely

high

P1

L3

MET04- J

medium

probable

medium

P8

L2

MET05- J

medium

probable

medium

P8

L2

MET06- J

medium

probable

medium

P8

L2

Rules

Rules

Severity

Likelihood

Remediation Cost

Priority

Level

MET30- J

low

unlikely

medium

P2

L3

MET31- J

low

unlikely

high

P1

L3

MET32- J

medium

probable

medium

P8

L2

MET33- J

low

unlikely

high

P1

L3

MET34- J

medium

unlikely

medium

P4

L3

...