 
                            Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | 
Risk Assessment Summary
| Rule | Severity | Likelihood | Detectable | Repairable | 
|---|
Recommendations
MET00-J. Understand the difference between overriding and hiding
MET01-J. Follow good design principles while defining methods
MET02-J. Avoid ambiguous uses of overloading
MET04-J. Always provide feedback about the resulting value of a method
MET05-J. Validate method parameters
MET06-J. Methods that perform a security check must be declared private or final
Rules
MET30-J. Follow the general contract while overriding the equals method
MET31-J. Ensure that hashCode() is overridden when equals() is overridden
MET32-J. Ensure that constructors do not call overridable methods
MET33-J. Do not subject overloaded methods to polymorphic invocations
MET34-J. Follow the general contract when implementing the compareTo method
MET35-J. Ensure that the clone method calls super.clone
MET36-J. Do not use deprecated methods
MET37-J. Do not call overridable methods from a privileged block
MET38-J. Do not invoke overridable methods on the clone under construction
Risk Assessment Summary
Recommendations
| Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| MET00-J | High | low Likely | unlikely No | medium No | P2 P9 | L3 L2 | 
| MET01-J | Medium | Probable low | unlikely No | high Yes | P1 P8 | L3 L2 | 
| MET02-J | Low | low Unlikely | unlikely Yes | high No | P1 P2 | L3 | 
| MET03-J | Medium | Probable low | unlikely No | high No | P1 P4 | L3 | 
| MET04-J | Medium | medium Probable | probable Yes | medium No | P8 | L2 | 
| MET05-J | Medium | medium Probable | probable Yes | medium No | P8 | L2 | 
| MET06-J | Medium | Probable medium | probable Yes | medium No | P8 | L2 | 
...
| MET07-JRules | LowSeverity | UnlikelyLikelihood | YesRemediation Cost | NoPriority | LevelP2 | L3 MET30 | 
| MET08-J | Low | low Unlikely | unlikely No | medium No | P2 P1 | L3 MET31 | 
| MET09-J | Low | Unlikely low | unlikely Yes | high No | P1 P2 | L3 MET32 | 
| MET10-J | Medium | medium Unlikely | probable No | medium No | P8 P2 | L2 L3 MET33 | 
| MET11-J | Low | Probable low | unlikely Yes | high No | P1 P4 | L3 MET34 | 
| MET12-J | Medium | medium Probable | unlikely Yes | medium No | P4 P8 | L3 L2 | 
| MET13-J | Medium | Likely | No | No | P6 | L2 | 
...
CON39-J. Ensure atomicity of 64-bit operations The CERT Sun Microsystems Secure Coding Standard for Java MET00-J. Understand the difference between overriding and hiding