|
This page was automatically generated and should not be edited. The information on this page was provided by outside contributors and has not been verified by SEI CERT. |
CERT Rule | Related Guidelines |
|---|---|
| IDS04-J | Guideline 1-1 / DOS-1: Beware of activities that may use disproportionate resources |
| OBJ01-J | Guideline 6-8 / MUTABLE-8: Define wrapper methods around modifiable internal state |
| OBJ02-J | Guideline 4-6 / EXTEND-6: Understand how a superclass can affect subclass behavior |
| OBJ04-J | Guideline 6-4 / MUTABLE-4: Support copy functionality for a mutable class |
| OBJ06-J | Guideline 6-2 / MUTABLE-2: Create copies of mutable output values |
| OBJ10-J | Guideline 6-10 / MUTABLE-10: Ensure public static final field values are constants |
| OBJ11-J | Guideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods |
| OBJ11-J | Guideline 7-3 / OBJECT-3: Defend against partially initialized instances of non-final classes |
| MET04-J | Guideline 4-1 / EXTEND-1: Limit the accessibility of classes, interfaces, methods, and fields |
| MET05-J | Guideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden |
| SER03-J | Guideline 8-2 / SERIAL-2: Guard sensitive data during serialization |
| SER04-J | Guideline 8-4 / SERIAL-4: Duplicate the SecurityManager checks enforced in a class during serialization and deserialization |
| SER07-J | Guideline 8-3 / SERIAL-3: View deserialization the same as object construction |
| SER09-J | Guideline 7-4 / OBJECT-4: Prevent constructors from calling methods that can be overridden |
| SEC00-J | Guideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged |
| SEC01-J | Guideline 9-3 / ACCESS-3: Safely invoke java.security.AccessController.doPrivileged |
| SEC05-J | Guideline 9-10 / ACCESS-10: Be aware of standard APIs that perform Java language access checks against the immediate caller |
| JNI00-J | Guideline 5-3 / INPUT-3: Define wrappers around native methods |
| OBJ58-J | Guideline 4-5 / EXTEND-5: Limit the extensibility of classes and methods |