Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable |
|---|
Recommendations
MET00-J. Understand the difference between overriding and hiding
MET01-J. Follow good design principles while defining methods
MET02-J. Avoid ambiguous uses of overloading
MET04-J. Always provide feedback about the resulting value of a method
Rules
MET30-J. Follow the general contract while overriding the equals method
MET31-J. Ensure that hashCode() is overridden when equals() is overridden
MET32-J. Ensure that constructors do not call overridable methods
MET33-J. Reserved (duplicate)
MET34-J. Follow the general contract when implementing the compareTo method
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| MET00-J | High | low Likely | unlikely No | high No | P1 P9 | L3 L2 |
| MET01-J | Medium | low Probable | unlikely No | high Yes | P1 P8 | L3 L2 |
| MET02-J | Low | low Unlikely | unlikely Yes | high No | P1 P2 | L3 |
| MET03-J | Medium | low Probable | unlikely No | high No | P1 P4 | L3 |
| MET04-J | medium | unlikely | medium | P4 | L3 |
Rules
| Medium | Probable | Yes | No | P8 | L2 | |||||
| MET05-J | Medium | Probable | Yes | No | P8 | L2 | ||||
| MET06-J | Medium | Probable | Yes | No | P8 | L2 | ||||
| MET07-J | Low | Unlikely | Yes | No | ||||||
Rules | Severity | Likelihood | Remediation Cost | Priority | Level | |||||
|---|---|---|---|---|---|---|---|---|---|---|
MET30-J | low | unlikely | medium | P2 | L3 MET31 | |||||
| MET08-J | Low | Unlikely low | unlikely No | high No | P1 | L3 | ||||
MET32-J | medium | probable | medium | P8 | L2 | |||||
| MET09-J | Low | Unlikely | Yes | No | P2 | L3 | ||||
| MET10-J | Medium | Unlikely | No | No | P2 | L3 | ||||
| MET11-J | Low | Probable | Yes | No | MET34-J | medium | unlikely | medium | P4 | L3 |
| MET12-J | Medium | Probable | Yes | No | P8 | L2 | ||||
| MET13-J | Medium | Likely | No | No | P6 | L2 |
...
CON34-J. Avoid deadlock by requesting fine-grained locks in the proper order The CERT Sun Microsystems Secure Coding Standard for Java MET00-J. Understand the difference between overriding and hiding