Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: REM cost reform

This rule is a stub.

Several guidelines are instances of this one, including ERR01-J. Do not allow exceptions to expose sensitive informationDRD00-J. Do not store sensitive information on external storage (SD card) unless encrypted first, and DRD11-J. Ensure that sensitive data is kept secure.

Noncompliant Code Example

This noncompliant code example shows an example where ...

Code Block
bgColor#FFCCCC
 

 


Compliant Solution

In this compliant solution, ...

 
Code Block
bgColor#CCCCFF

Risk Assessment

Leaking sensitive information outside a trust boundary is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Detectable

Repairable

Priority

Level

IDS15-J

Medium

Low

Likely

Probable

No

High

No

P2

P6

L3

L2

Automated Detection

TBD

ToolVersionCheckerDescription
The Checker Framework

Include Page
The Checker Framework_V
The Checker Framework_V

Tainting CheckerTrust and security errors (see Chapter 8)

Bibliography

[Fortify 2014]123, 4.



Image Added Image Added Image Added