Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: REM Cost Reform

This rule is a stub.

Several guidelines are instances of this one, including ERR01-J. Do not allow exceptions to expose sensitive informationDRD00. Do not store sensitive information on external storage (SD card) unless encrypted first, and DRD11. Ensure that sensitive data is kept secure.

Noncompliant Code Example

This noncompliant code example shows an example where ...

Code Block
bgColor#FFCCCC
 


Compliant Solution

In this compliant solution, ...

 
Code Block
bgColor#CCCCFF

Risk Assessment

Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Detectable

Repairable

Priority

Level

IDS15

MSC25-

J

C

Medium

Likely

Probable

No

High

No

P6

P4

L2

L3

Automated Detection

ToolVersionCheckerDescription
The Checker Framework
CodeSonar
Include Page
The Checker Framework
CodeSonar_V
The Checker Framework_VTainting Checker
CodeSonar_V

BADMACRO.WEAK_CRYPTO
BADFUNC.WEAKCRYPTO

Use of Weak Cryptographic Algorithm
Weak Cryptography

Related Guidelines

Bibliography