Guidelines
FIO00-J. Defensively copy mutable inputs and mutable internal components
FIO01-J. Do not expose buffers created using the wrap() or duplicate() methods to untrusted code
FIO02-J. Keep track of bytes read and account for character encoding while reading data
FIO03-J. Specify the character encoding while performing file or network IO
FIO04-J. Canonicalize path names before validating
FIO05-J. Do not create multiple buffered wrappers on an InputStream
FIO06-J. Ensure all resources are properly closed when they are no longer needed
FIO07-J. Do not create temporary files in shared directories
FIO08-J. Do not log sensitive information
FIO09-J. Exclude user input from format strings
FIO10-J. Do not let Runtime.exec() fail or block indefinitely
...
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Recommendations
...