 
                            ...
Misuse of APIs that perform language access checks only against the immediate caller can break data encapsulation, leak sensitive information, or permit privilege escalation attacks.
| Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level | 
|---|---|---|---|---|---|---|
| SEC05-J | High | Probable | Yes | MediumNo | P12 | L1 | 
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar | 
 | JAVA.CLASS.ACCESS.BYPASS | Reflection bypasses member accessibility (Java) | ||||||
| Parasoft Jtest | 
 | CODSTACERT.BPSEC05.ARM | ImplementedAvoid using reflection methods | ||||||
| SonarQube | 
 | Changing or bypassing accessibility is security-sensitive | |||||||
| SpotBugs | 
 | REFL_REFLECTION_INCREASES_ACCESSIBILITY_OF_CLASS | Implemented (since 4.5.0) | 
Related Guidelines
| Guideline 9-10 / ACCESS-10: Be aware of standard APIs that perform Java language access checks against the immediate caller | 
...