 
                            Recommendations
DCL00-J. Use visually distinct identifiers
DCL01-J. Use 'L', not 'l', to indicate a long value
DCL02-J. Use variable arguments (varargs) in moderation
DCL03-J. Use meaningful symbolic constants to represent literal values in program logic
DCL04-J. Do not declare more than one variable per declaration
DCL05-J. Properly encode relationships in constant definitions
DCL06-J. Beware of integer literals beginning with '0'
DCL07-J. Qualify immutable types and objects with the final keyword
Rules
DCL30-J. Do not use the for-each idiom for initialization or assignment
Risk Assessment Summary
Recommendations
| Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| DCL00-J | low | unlikely | high | P1 | L3 | 
| DCL01-J | low | unlikely | low | P3 | L3 | 
| DCL02-J | low | unlikely | low | P3 | L3 | 
| DCL03-J | low | unlikely | high | P1 | L3 | 
| DCL04-J | low | unlikely | low | P3 | L3 | 
| DCL05-J | low | unlikely | high | P1 | L3 | 
| DCL06-J | low | unlikely | low | P3 | L3 | 
Rules
SEC35-J. Ensure that the bytecode verifier is applied to all involved code upon any modification The CERT Sun Microsystems Secure Coding Standard for Java DCL00-J. Use visually distinct identifiers