MET13-J. Do not assume that reassigning method arguments modifies the calling environment
This rule is a stub.
Noncompliant Code Example
This noncompliant code example shows an example where ...
Non-compliant code
Compliant Solution
In this compliant solution, ...
Compliant code
Risk Assessment
Leaking sensitive information outside a trust boundary is not a good idea.
| Rule | Severity | Likelihood | Detectable | Repairable | Priority | Level |
|---|---|---|---|---|---|---|
| MET13-J | Medium | Likely | No | No | P6 | L2 |
Automated Detection
Tool | Version | Checker | Description |
|---|---|---|---|
| Security Reviewer - Static Reviewer | 6.02 | CWE561P25 | Full Implementation |
Bibliography
| FindBugs Bug Descriptions (Unabridged) | IP_PARAMETER_IS_DEAD_BUT_OVERWRITTEN |