Recommendations

SEC00-J. Do not allow exceptions to transmit sensitive information

SEC01-J. Be careful using doPrivileged

SEC02-J. Beware of standard APIs that may bypass Security Manager checks

SEC03-J. Beware of standard APIs that may use the immediate caller's class loader instance

SEC04-J. Beware of standard APIs that perform access checks against the immediate caller

EXC00-J. Handle exceptions appropriately

SEC06-J. Assume that all Java clients can be reverse engineered, monitored, and modified

SEC07-J. Minimize accessibility

Rules

SEC30-J. Always use a Security Manager

SEC31-J. Never grant AllPermission

SEC32-J. Do not grant ReflectPermission with action suppressAccessChecks

SEC33-J. Define wrappers around native methods

SEC34-J. Do not allow the unauthorized construction of sensitive classes

SEC35-J. Provide mutable classes with a clone method

SEC36-J. Ensure that the bytecode verifier is applied to all involved code upon any modification

Risk Assessment Summary

Rules

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC30-C

high

likely

low

P27

L1

SEC31-C

medium

probable

medium

P8

L2

SEC32-C

low

unlikely

high

P1

L3