Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Automated Detection

The tool Compass Rose can detect violations of the recommendation for single-file programs.

Mitigation Strategies

Static Analysis

...