You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Generated Content

This page is automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly.

Version number:

Unable to render {include} The included page could not be found.

Checker

Guideline

CallToDeprecatedMethodMET02-J. Do not use deprecated or obsolete classes or methods
ObjectFinalizeCheckMET12-J. Do not use finalizers
ObjectFinalizeOverridenCallsSuperFinalizeCheckMET12-J. Do not use finalizers
ObjectFinalizeOverridenCheckMET12-J. Do not use finalizers
S106ERR02-J. Prevent exceptions while logging data
S112ERR07-J. Do not throw RuntimeException, Exception, or Throwable
S1143ERR04-J. Do not complete abruptly from a finally block
S1147ERR09-J. Do not allow untrusted code to terminate the JVM
S1163ERR05-J. Do not let checked exceptions escape from a finally block
S1166ERR00-J. Do not suppress or ignore checked exceptions
S1174MET12-J. Do not use finalizers
S1181ERR08-J. Do not catch NullPointerException or any of its ancestors
S1206MET09-J. Classes that define an equals() method must also define a hashCode() method
S1217THI00-J. Do not invoke Thread.run()
S1313MSC03-J. Never hard code sensitive information
S1444OBJ10-J. Do not use public static nonfinal fields
S1696ERR08-J. Do not catch NullPointerException or any of its ancestors
S1698EXP03-J. Do not use the equality operators when comparing values of boxed primitives
S1699MET05-J. Ensure that constructors do not call overridable methods
S1860LCK01-J. Do not synchronize on objects that may be reused
S1872OBJ09-J. Compare classes and not class names
S1943STR04-J. Use compatible character encodings when communicating string data between JVMs
S1989ERR01-J. Do not allow exceptions to expose sensitive information
S2057SER00-J. Enable serialization compatibility during class evolution
S2059SER05-J. Do not serialize instances of inner classes
S2061SER01-J. Do not deviate from the proper signatures of serialization methods
S2066SER05-J. Do not serialize instances of inner classes
S2068MSC03-J. Never hard code sensitive information
S2077IDS00-J. Prevent SQL injection
S2095FIO04-J. Release resources when they are no longer needed
S2111NUM10-J. Do not construct BigDecimal objects from floating-point literals
S2151MET12-J. Do not use finalizers
S2159EXP02-J. Do not use the Object.equals() method to compare two arrays
S2162MET08-J. Preserve the equality contract when overriding the equals() method
S2175EXP04-J. Do not pass arguments to certain Java Collections Framework methods that are a different type than the collection parameter type
S2201EXP00-J. Do not ignore values returned by methods
S2245MSC02-J. Generate strong random numbers
S2259EXP01-J. Do not use a null in a case where an object is required
S2274THI03-J. Always invoke wait() and await() methods inside a loop
S2276LCK09-J. Do not perform operations that can block while holding a lock
S2384OBJ05-J. Do not return references to private mutable class members
S2384OBJ06-J. Defensively copy mutable inputs and mutable internal components
S2386OBJ01-J. Limit accessibility of fields
S2445LCK00-J. Use private final lock objects to synchronize classes that may interact with untrusted code
S2446THI02-J. Notify all waiting threads rather than a single thread
S2653ENV06-J. Production code must not contain debugging entry points
S2674FIO10-J. Ensure the array is filled when using read() to fill an array
S3346EXP06-J. Expressions used in assertions must not produce side effects
S881EXP05-J. Do not follow a write by a subsequent write or read of the same object within an expression
  • No labels