Explore
551-575 of 589
Use isNotEqualTo instead of equals isFalse
Use isNotEqualTo instead of equals isFalse
- warning
- java
- AssertJ
- framework specific
- quality
Use isNotEqualTo instead of !equals isTrue
Use isNotEqualTo instead of !equals isTrue
- warning
- java
- AssertJ
- framework specific
- quality
Use isNotEqualTo instead of == isFalse
Use isNotEqualTo instead of == isFalse
- warning
- java
- AssertJ
- framework specific
- quality
Use isNotEqualTo instead of != isTrue
Use isNotEqualTo instead of != isTrue
- warning
- java
- AssertJ
- framework specific
- quality
Use isNotNull rather than isNotEqualTo(null)
Use isNotNull rather than isNotEqualTo(null)
- warning
- java
- AssertJ
- framework specific
- quality
Use isNull rather than isEqualTo(null)
Use isNull rather than isEqualTo(null)
- warning
- java
- AssertJ
- framework specific
- quality
Use isTrue rather than isEqualTo(true)
Use isTrue rather than isEqualTo(true)
- warning
- java
- AssertJ
- framework specific
- quality
Use matches(pattern) instead of matches(Pattern.compile(pattern))
Use matches(pattern) instead of matches(Pattern.compile(pattern))
- warning
- java
- AssertJ
- framework specific
- quality
Use requestMapping on public methods
RequestMapping should not be used on non-public methods
- warning
- java
- Spring
- framework specific
- web
- Spring Web
- quality
Use SecureRandom instead of Random
Using Random can lead to predictable randomness
- error
- java
- security
- SEI CERT
Use SSLSocket instead of Socket/ServerSocket
Use SSLSocket instead of Socket/ServerSocket
- warning
- java
- security
- web
- SEI CERT
Use .stronger() for a more secure alternative
Encryptors.stronger() is more secure than Encryptors.standard()
- warning
- java
- Spring
- security
- framework specific
- Spring Security
Use the Region enum
AWS recommends to use one of the constants in the Regions enum
- warning
- java
- framework specific
- AWS
- quality
Validate Zip Entries
Ensure the zip entry is validated for nesting depth and size
- warning
- java
- security
- Java basic
Vulnerable Log4j dependency - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
Vulnerable Log4j dependency - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
- error
- xml
- Apache Maven
- Log4j
- OWASP Top 10
- SLF4J
- basic protection set
- framework specific
- injection
- logging
- security
Vulnerable Log4j version - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
Vulnerable Log4j version - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
- error
- java
- kotlin
- Log4j
- OWASP Top 10
- SLF4J
- basic protection set
- framework specific
- injection
- logging
- security
Vulnerable Log4j version property - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
Vulnerable Log4j version property - Log4Shell/CVE-2021-44228/CVE-2021-45046/CVE-2021-45105
- error
- xml
- Apache Maven
- Log4j
- OWASP Top 10
- SLF4J
- basic protection set
- framework specific
- injection
- logging
- security
WebView Best Practices: Check URL to White List
Consider allowlist validation for URLs passed to this method
- error
- java
- security
- mobile
- framework specific
- Android
WebView Best Practices: Disable File Access (constructor)
Enabling file access in the webview could lead to misuse
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView Best Practices: Disable File Access (setter)
Enabling file access in the webview could lead to misuse
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView best practices: Disable Geolocation (constructor)
Enabling geolocation in the webview could lead to data exposure
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView best practices: Disable Geolocation (setter)
Enabling geolocation in the webview could lead to data exposure
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView best practices: Disable JavaScript (constructor)
Enabling JavaScript in the webview could lead to XSS
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView best practices: Disable JavaScript (setter)
Enabling JavaScript in the webview could lead to XSS
- error
- java
- security
- framework specific
- Android
- mobile
- Android security set
WebView Best Practices: Do not allow access to local resources
Avoid targeting local resources
- warning
- java
- security
- framework specific
- mobile
- Android