Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 21 Next »

Recommendations

SEC00-J. Do not allow exceptions to transmit sensitive information

SEC01-J. Be careful using doPrivileged

SEC02-J. Beware of standard APIs that may bypass Security Manager checks

SEC03-J. Beware of standard APIs that may use the immediate caller's class loader instance

SEC04-J. Beware of standard APIs that perform access checks against the immediate caller

SEC05-J. Handle exceptions appropriately

Rules

SEC30-J. Always use a Security Manager

SEC31-J. Never grant AllPermission

SEC32-J. Do not grant ReflectPermission with action suppressAccessChecks

SEC33-C. Define wrappers around native methods

SEC34-C. Do not allow the unauthorized construction of sensitive classes

SEC35-C. Provide mutable classes with a clone method

SEC36-C. Ensure that the bytecode verifier is applied to all involved code upon any modification

Risk Assessment Summary

Rules

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC30-C

high

likely

low

P27

L1

SEC31-C

medium

probable

medium

P8

L2

SEC32-C

low

unlikely

high

P1

L3

  • No labels