Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Risk Assessment Summary
Rule | Severity | Likelihood | Detectable | Repairable |
|---|
Guidelines
MET00-J. Follow good design principles while defining methods
MET01-J. Avoid ambiguous uses of overloading
MET02-J. Validate method parameters
MET03-J. Methods that perform a security check must be declared private or final
MET04-J. Ensure that constructors do not call overridable methods
MET05-J. Do not subject overloaded methods to polymorphic invocations
MET06-J. Do not call overridable methods from a privileged block
MET07-J. Do not invoke overridable methods on the clone under construction
MET08-J. Do not use the clone method to copy untrusted method parameters
MET09-J. Always provide feedback about the resulting value of a method
MET11-J. Understand the difference between overriding and hiding
MET12-J. Follow the general contract while overriding the equals method
MET13-J. Ensure that hashCode() is overridden when equals() is overridden
MET14-J. Follow the general contract when implementing the compareTo method
MET15-J. Do not use deprecated or obsolete methods
MET16-J. Ensure that the clone method calls super.clone
Risk Assessment Summary
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level | |
|---|---|---|---|---|---|---|
| MET00-J | High | low Likely | unlikely No | high No | P1 P9 | L3 L2 |
| MET01-J | Medium | low Probable | unlikely No | high Yes | P1 P8 | L3 L2 |
| MET02-J | Low | medium Unlikely | probable Yes | medium No | P8 P2 | L2 L3 |
| MET03-J | Medium | medium Probable | probable No | medium No | P8 P4 | L2 L3 |
| MET04-J | Medium | medium Probable | probable Yes | medium No | P8 | L2 |
| MET05-J | Medium | low Probable | unlikely Yes | high No | P1 P8 | L3 L2 |
| MET06-J | Medium | high Probable | probable Yes | medium No | P12 P8 | L1 L2 |
| MET07-J | Low | medium Unlikely | probable Yes | low No | P12 P2 | L1 L3 |
| MET08-J | Low | high Unlikely | likely No | low No | P27 P1 | L1 L3 |
| MET09-J | Low | Unlikely medium | probable Yes | medium No | P8 P2 | L2 L3 |
| MET10-J | Medium | low Unlikely | unlikely No | high No | P1 P2 | L3 |
| MET11-J | Low | low Probable | unlikely Yes | medium No | P2 P4 | L3 |
| MET12-J | Medium | low Probable | unlikely Yes | medium No | P2 P8 | L3 L2 |
| MET13-J | low Medium | unlikely Likely | high No | P1 No | L3 P6 | |
MET14- J | medium | unlikely | medium | P4 | L3 | |
MET15- J | high | likely | medium | P18 | L1 | |
L2 |
...
CON16-J. Do not expect sleep() and yield() methods to have any synchronization semantics The CERT Sun Microsystems Secure Coding Standard for Java MET11-J. Understand the difference between overriding and hiding