Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Guidelines

MSC07-J. Eliminate class initialization cycles

MSC06-J. Avoid memory leaks

MSC08-J. Avoid cyclic dependencies between packages

MSC12-J. Prefer using Iterators over Enumerations

MSC09-J. Carefully design interfaces before releasing them

MSC00-J. Do not mix generic with non-generic raw types in new code

MSC14-J. Finish every set of statements associated with a case label with a break statement

MSC11-J. Do not assume infinite heap space

MSC10-J. Limit the lifetime of sensitive data

MSC01-J. Do not use insecure or weak cryptographic algorithmsMSC10-J. Detect and remove dead code

MSC02-J. Generate truly random numbers

MSC03-J. Never hardcode sensitive information

MSC04-J. Do not use Object.equals() to compare cryptographic keys

MSC05-J. Make sensitive classes noncloneable

MSC06-J. Avoid memory leaks

MSC07-J. Eliminate class initialization cycles

MSC08-J. Avoid cyclic dependencies between packages

MSC09-J. Carefully design interfaces before releasing them

MSC10-J. Limit the lifetime of sensitive data

MSC11-J. Do not assume infinite heap space

MSC12-J. Prefer using Iterators over Enumerations

MSC13-J. Do not modify the underlying collection when an iteration is in progress

MSC34-J. Reserved (sent to the VOID)

MSC04-J. Do not use Object.equals() to compare cryptographic keysMSC14-J. Finish every set of statements associated with a case label with a break statement

MSC15-J. Use numerical comparison operators to terminate a loop whose counter changes by more than one

MSC10-J. Detect and remove dead code

MSC34-J. Reserved (sent to the VOID)

Risk Assessment Summary

Recommendations

...