 
                            | Prevent C checkers | CERT C Secure Coding Standard | 
|---|
| BAD_COMPARE | |
| BAD_FREE | |
| CHAR_IO | [                        FIO34-C. Use int to capture the | 
| CHECKED_RETURN | [        FIO33-C. Detect and handle input output | 
| DEADCODE | [ MSC07-A. Detect and remove dead code | 
| FORWARD_NULL | [        EXP34-C. Ensure a pointer is valid before | 
| MISSING_RETURN | [        MSC02-A. Avoid errors of omission   > | 
| NEGATIVE_RETURNS | [        INT31-C. Ensure that integer conversions | 
| NO_EFFECT | [ No equivalent | 
| NULL_RETURNS | [            EXP34-C. Ensure a pointer is valid | 
| OVERRUN_STATIC | [        STR34-C. Do not copy data from an | 
| OVERRUN_DYNAMIC | [        STR34-C. Do not copy data from an | 
| RESOURCE_LEAK | [         MEM31-C. Free dynamically allocated memory | 
| RETURN_LOCAL | [            DCL30-C. Do not refer to an object | 
| REVERSE_INULL            EXP34-C. Ensure a pointer is valid | |
| REVERSE_NEGATIVE | [   INT31-C. Ensure that integer conversions do | 
| SIZECHECK | [ No equivalent | 
| STACK_USE | [ MEM05-A. Avoid large stack allocations | 
| UNINIT | [                            EXP33-C. Do not reference | 
| UNUSED_VALUE | [ No equivalent | 
| USE_AFTER_FREE | [ MEM30-C. Do not access freed memory | 
| VARARGS | [ (preview) No equivalent | 
(1) MSC02-A is a superset of 6.1.1 but we could break this out into a rule
(2) 6.1.4 is a pattern checker,  FIO33-C list specific functions that
need to be checked
(3)  6.1.6 , 6.1.10, and 6.1.15 all check for cases covered under EXP34-C