 
                            ...
| Rule | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| SEC35-J | ?? | ?? | ?? | P?? | L?? | 
Automated Detection
TODO
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.(h2. Ref)erences
References
Sun Secure Coding Guidelines
 object.clone() http://java.sun.com/j2se/1.4.2/docs/api/java/lang/Object.html#clone( )
)