List of all checkers available in the Julia analyzer   as of version 2.6.0 (built on 6 Sep 2018)

The following is the list of all checkers available in the Julia analyzer. Click on the name of a checker to see its detailed documentation.


  • AbsOfRandom  [Identify computations of absolute values of random integers]
  • Approximation  [Identify operations that might be incorrect because of numerical approximations]
  • Authentication  [Identify authentication security risks]
  • BadEq  [Identify possibly incorrect uses of == and equals()]
  • BadExtension  [Identify possibly inconsistent class redefinitions or method overriding]
  • BasicInjection  [Identify simple security injections]
  • BasicNullness  [Identify simple nullness bugs]
  • CallSuper  [Identify possibly missing calls to super()]
  • CallsOnArray  [Identify suspicious calls over arrays]
  • Classcast  [Identify possibly incorrect classcasts]
  • Clone  [Identify possibly incorrect object cloning implementations]
  • CloseResource  [Identify leakage of resources left open]
  • CompareTo  [Identify incorrect definitions of compareTo()]
  • Concurrency  [Identify basic concurrency errors]
  • Cookie  [Identify uses of insecure cookies in HTTPS connections]
  • Cryptography  [Identify the use of unsafe cryptographic algorithms]
  • Deadcode  [Identify methods or constructors never used]
  • EqualsHashCode  [Identify incorrect definitions of equals()/hashCode()]
  • ExceptionHandlers  [Identify possibly incorrect exception handlers]
  • FieldAccess  [Identify fields never read or never written]
  • Gdpr  [Identify privacy issues for GDPR compliance, and produce a detailed report]
  • GuardedBy  [Check and infer @GuardedBy and @Holding annotations]
  • ImproperField  [Identify fields that should be replaced by local variables or made final]
  • InefficientConstruction  [Identify inefficient constructions when static constants or factories can be used]
  • InfiniteRecursion  [Identify calls that look like infinite recursion]
  • Injection  [Identify potential security injections]
  • InnerClasses  [Identify problems in inner classes]
  • Intents  [Identify potential dangerous flows of information through Android intents]
  • Ldap  [Identify potential LDAP poisoning attacks]
  • Leak  [Identify situation where resources are leaked by preventing their garbage-collection]
  • Nullness  [Identify where null might be dereferenced or passed to a library]
  • Passwords  [Identify insecure manipulations of passwords]
  • PrivacyAndroid  [Identify potential dangerous information flows in Android applications]
  • Production  [Identify operations that are not adequate for production code]
  • Random  [Identify uses of insecure random number generators]
  • Resources  [Identify incorrect uses of the resources of the application]
  • Serialization  [Identify serialization problems]
  • ShortCircuit  [Identify where a logical bitwise operation is used instead of a logical Boolean operation]
  • SideEffects  [Identify unexpected or suspicious side-effects]
  • StaticFieldAccess  [Identify where a static field is modified in a non-static context]
  • UnusedClass  [Identify unused classes]
  • UnusedReturnValue  [Identify where the return value of a method might be incorrectly discarded]
  • UselessAssignment  [Identify useless assignments]
  • UselessCall  [Identify useless method calls]
  • UselessConstruction  [Identify useless constructions of objects]
  • UselessInstanceof  [Identify useless instanceof operations]
  • UselessTest  [Identify useless tests]
  • Xxe  [Identify potential external XML entity reference attacks]
  • Zip  [Identify incorrect uses of zip and jar entries]