C++ Test Suite for Source Code Analyzer - false positive Test suite #58
DownloadDescription
This test suite tests against Source Code Security Analyzer based on functional requirements SCA-RM-6 specified in "Source Code Security Analysis Tool Functional Specification"
Displaying test cases 26 - 39 of 39 in total
-
Assume all input is malicious. Use an appropriate combination of black lists and white lists to ensure only valid and expected input is processed by the system.
-
The test cases shows hard-coded passwords is not used.
-
The test cases shows passwords are stored in a vector and not hard-coded.
-
The test cases shows passwords are stored in the system and not hard-coded.
-
The test cases shows passwords are stored in the system and not hard coded.
-
The test cases shows passwords are stored in the system and not hard coded.
-
Allocated memory is deleted after use. There will be no memory leak.
-
Pointer is initialized before use.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer. The code has scope complexity.
-
The test case shows a Heap Overflow will not occur when assigning a character \'a\' to a heap buffer. The code has array address complexity.
-
Variable is initialized before use.
-
This test case shows index variable of a loop is initialized before use.
-
This test case shows the debugging code is removed from the program. Please refer to test cases 2196