List of all checkers available in the Julia analyzer   as of version 2.4 (built on 23 Oct 2017)

The following is the list of all checkers available in the Julia analyzer. Click on the name of a checker to see its detailed documentation.


  • AbsOfRandom  [Identify computations of absolute values of random integers]
  • Approximation  [Identify operations that might be incorrect because of numerical approximations]
  • Authentication  [Identify authentication security risks]
  • BadEq  [Identify possibly incorrect uses of == and equals()]
  • BadExtension  [Identify possibly inconsistent class redefinitions or method overriding]
  • BasicInjection  [Identify simple security injections]
  • BasicNullness  [Identify simple nullness bugs]
  • CallSuper  [Identify possibly missing calls to super()]
  • CallsOnArray  [Identify suspicious calls over arrays]
  • Classcast  [Identify possibly incorrect classcasts]
  • Clone  [Identify possibly incorrect object cloning implementations]
  • CloseResource  [Identify leakage of resources left open]
  • CompareTo  [Identify incorrect definitions of compareTo()]
  • Concurrency  [Identify basic concurrency errors]
  • Cookie  [Identify uses of insecure cookies in HTTPS connections]
  • Cryptography  [Identify the use of unsafe cryptographic algorithms]
  • Deadcode  [Identify methods or constructors never used]
  • EqualsHashCode  [Identify incorrect definitions of equals()/hashCode()]
  • ExceptionHandlers  [Identify possibly incorrect exception handlers]
  • FieldAccess  [Identify fields never read or never written]
  • GuardedBy  [Check and infer @GuardedBy and @Holding annotations]
  • ImproperField  [Identify fields that should be replaced by local variables or made final]
  • InefficientConstruction  [Identify inefficient constructions when static constants or factories can be used]
  • InfiniteRecursion  [Identify calls that look like infinite recursion]
  • Injection  [Identify potential security injections]
  • InnerClasses  [Identify problems in inner classes]
  • Intents  [Identify potential dangerous flows of information through Android intents]
  • Ldap  [Identify potential LDAP poisoning attacks]
  • Leak  [Identify situation where resources are leaked by preventing their garbage-collection]
  • Nullness  [Identify where null might be dereferenced or passed to a library]
  • Passwords  [Identify insecure manipulations of passwords]
  • PrivacyAndroid  [Identify potential dangerous information flows in Android applications]
  • Production  [Identify operations that are not adequate for production code]
  • Random  [Identify uses of insecure random number generators]
  • Resources  [Identify incorrect uses of the resources of the application]
  • Serialization  [Identify serialization problems]
  • ShortCircuit  [Identify where a logical bitwise operation is used instead of a logical Boolean operation]
  • StaticFieldAccess  [Identify where a static field is modified in a non-static context]
  • Termination  [Prove termination of methods and constructors]
  • UnusedClass  [Identify unused classes]
  • UnusedReturnValue  [Identify where the return value of a method might be incorrectly discarded]
  • UselessAssignment  [Identify useless assignments]
  • UselessCall  [Identify useless method calls]
  • UselessConstruction  [Identify useless constructions of objects]
  • UselessInstanceof  [Identify useless instanceof operations]
  • UselessTest  [Identify useless tests]
  • Xxe  [Identify potential external XML entity reference attacks]
  • Zip  [Identify incorrect uses of zip and jar entries]