Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Recommendations
Rule | Severity | Likelihood | Detectable | Repairable | Priority | Level |
|---|---|---|---|---|---|---|
| FIO00-J |
...
| Medium | Unlikely | No | No | P2 | L3 | |
| FIO01-J |
...
| Medium | Probable | No | No | P4 | L3 | |
| FIO02-J | Medium | Probable | Yes | Yes | P12 | L1 |
| FIO03-J | Medium | Probable | No | No | P4 | L3 |
| FIO04-J | Low | Probable | Yes | No | P4 | L3 |
| FIO05-J | Medium | Likely | No | No | P6 | L2 |
| FIO06-J | Low | Unlikely | No | No | P1 | L3 |
| FIO07-J | Low | Probable | Yes | No | P4 | L3 |
| FIO08-J | High | Probable | Yes | Yes | P18 | L1 |
| FIO09-J | Low | Unlikely | No | Yes | P2 | L3 |
| FIO10-J | Low | Unlikely | No | No | P1 | L3 |
| FIO12-J | Low | Unlikely | No | No | P1 | L3 |
| FIO13-J | Medium | Probable | No | No | P4 | L3 |
| FIO14-J | Medium | Likely | No | No | P6 | L2 |
| FIO16-J | Medium | Unlikely | No | No | P2 | L3 |
...
...
FIO02-J. Use Runtime.exec() correctly
FIO03-J. Prevent exceptions while logging data
FIO04-J. Understand the limitations of the logging framework
FIO05-J. Document character encoding while performing file IO
Rules
FIO31-J. Create a copy of mutable inputs
FIO32-J. Do not serialize sensitive data
FIO33-J. Do not allow serialization and deserialization to bypass the Security Manager
FIO34-J. Ensure all resources are properly closed when they are no longer needed
FIO35-J. Exclude user input from format strings
FIO36-J. Never hardcode sensitive information
FIO37-J. Do not assume infinite heap space when reading in data
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
FIO00-A | low | unlikely | medium | P2 | L3 |
Rules
...
Rules
...
Severity
...
Likelihood
...
Remediation Cost
...
Priority
...
Level
...
FIO30-C
...
low
...
unlikely
...
medium
...
P2
...