Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable |
|---|
Recommendations
DCL00-J. Use visually distinct identifiers
DCL01-J. Use 'L', not 'l', to indicate a long value
DCL02-J. Use variable arguments (varargs) in moderation
DCL03-J. Use meaningful symbolic constants to represent literal values in program logic
DCL04-J. Do not declare more than one variable per declaration
DCL05-J. Properly encode relationships in constant definitions
DCL06-J. Beware of integer literals beginning with '0'
Rules
DCL30-J. Do not use the for-each idiom for initialization or assignment
DCL31-J. Qualify constants with the final and static modifiers
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| DCL00-J | Low | low Unlikely | unlikely Yes | high No | P1 P2 | L3 |
| DCL01-J | Low | low Unlikely | unlikely Yes | low No | P3 P2 | L3 |
| DCL02-J | low Low | unlikely Unlikely | low Yes | P3 | L3 | |
DCL03-J | low | unlikely | high | P1 | L3 | |
DCL04-J | low | unlikely | low | P3 | L3 | |
DCL05-J | low | unlikely | high | P1 | L3 | |
DCL06-J | low | unlikely | low | P3 | L3 |
Rules
| No | P2 | L3 |
...
SEC35-J. Ensure that the bytecode verifier is applied to all involved code upon any modification The CERT Sun Microsystems Secure Coding Standard for Java DCL00-J. Use visually distinct identifiers