Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable |
|---|
Recommendations
DCL00-J. Use visually distinct identifiers
DCL01-J. Use 'L', not 'l', to indicate a long value
DCL02-J. Use variable arguments (varargs) in moderation
DCL03-J. Use meaningful symbolic constants to represent literal values in program logic
DCL05-J. Properly encode relationships in constant definitions
Rules
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| DCL00-J | Low | low Unlikely | unlikely Yes | high No | P1 P2 | L3 |
| DCL01-J | Low | low Unlikely | unlikely Yes | low No | P3 P2 | L3 DCL03 |
| DCL02-J | low Low | unlikely Unlikely | high Yes | P1 | L3 | |
DCL05-J | low | unlikely | high | P1 | L3 |
Rules
| No | P2 | L3 |
...
SEC35-J. Ensure that the bytecode verifier is applied to all involved code upon any modification The CERT Sun Microsystems Secure Coding Standard for Java DCL00-J. Use visually distinct identifiers