Recommendations
ENV00-J. Do not sign code that performs only unprivileged operations
ENV01-J. Be aware of the JVM Tool Interface
ENV02-J. Be aware of the Java Platform Debugger Architecture
ENV03-J. Limit remote uses of JVM Monitoring and Managing
Rules
ENV30-J. Create a secure sandbox using a Security Manager
ENV31-J. Never grant AllPermission to untrusted code
ENV32-J. Do not grant ReflectPermission with target suppressAccessChecks
ENV33-J. Do not grant RuntimePermission with target createClassLoader
ENV34-J. Do not disable bytecode verification
ENV35-J. Provide a trusted environment and sanitize all inputs
Risk Assessment Summary
Recommendations
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
|---|
Rules
Rule |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
|---|
The CERT Sun Microsystems Secure Coding Standard for Java The CERT Sun Microsystems Secure Coding Standard for Java