AWS logo
Amazon QDetector LibrarySign in to Amazon Q
AWSbreadcrumb dividerDocumentationbreadcrumb dividerAmazon Qbreadcrumb dividerDetector Librarybreadcrumb dividerJavabreadcrumb dividerTagsFeedbackFeedback icon

Q

Detector Library

Java detectors (132/132)

Reflected cross site scriptingMandatory method not called after object creationProcess empty record list in Amazon KCLAWS object presence checkMissing timeout check on CountDownLatch.awaitUnspecified default valueDevice Permission Usage.Deserialization of untrusted objectPreserve thread interruption status ruleMissing check on the value returned by moveToFirst APIMissing timeout check on ExecutorService.awaitTerminationOverflow when deserializing relational database objectsCustom manual retries of AWS SDK callsMissing null check for cache response metadataInefficient usage of Transaction library from AWS LabsInsecure connection using unencrypted protocolInefficient additional authenticated data (AAD) authenticityUse of a deprecated methodError-prone AWS IAM policy creationUse of externally-controlled input to build connection stringInefficient Amazon S3 manual paginationMutually exclusive callAWS Lambda client not reusedMissing check on the result of createNewFileSensitive data stored unencrypted due to partial encryptionMissing statement to record cause of InvocationTargetExceptionMisconfigured ConcurrencyInefficient polling of AWS resourceImproper InitializationUnexpected re-assignment of synchronized objectsXPath injectionAWS client not reused in a Lambda functionLong polling is not enabled in Amazon SQSInsecure temporary file or directoryHTTP response splittingInput and output values become out of syncServer-side request forgeryMissing Authorization for address idDo not catch and throw exceptionConcurrency deadlockNot recommended aws credentials classesPath traversalOverride of reserved variable names in a Lambda functionMissing byte array length of JSON parserUsage of an API that is not recommendedHardcoded credentialsInsecure JSON web token (JWT) parsingNot calling finalize causes skipped cleanup stepsUnchecked S3 object metadata content lengthUntrusted data in security decisionPermissive cors configuration ruleInsecure cookieResource leakXML External EntityBad parameters used with AWS API methodsMissing position check before getting substringLDAP injectionAvoid reset exception in Amazon S3Insecure hashingBackward compatibility breaks with error message parsingInefficient map entry iterationMissing S3 bucket owner conditionAWS DynamoDB getItem output is not null checkedInvalid public method parametersLog injectionSensitive information leakUsage of multiple date time pattern formatterSynchronous publication of AWS Lambda metricsXML External Entity Document Builder FactoryImproper use of classes that aren't thread-safeIncorrect null check before setting a valueInsufficient use of name in Amazon SQS queueMissing check on the value returned by ResultSet.nextInsecure TLS versionUnsanitized input is run as codeUse an enum to specify an AWS RegionImproperly formatted string argumentsImproper service shutdownUnrestricted upload of dangerous file typeUntrusted AMI imagesInsecure SAML parser configurationCross-site request forgeryCase sensitive keys in S3 object user metadataStack trace not included in re-thrown exceptionRegion specification missing from AWS client initializationInsufficient number of PBEKeySpec iterationsURL redirection to untrusted siteUse of externally-controlled input to select classes or codeMissing encryption of sensitive data in storageIgnored output of DynamoDBMapper operationsNull pointer dereferenceCross-site scriptingUnauthenticated LDAP requestsUse of inefficient APIsLow maintainability with old Android featuresAtomicity violationMissing handling of specifically-thrown exceptionsWeak obfuscation of web requestClear text credentialsSession fixationCatching and not re-throwing or logging exceptionsMissing check when launching an Android activity with an implicit intentClient constructor deprecationInefficient use of stream sortingArithmetic overflow or underflowSimplifiable codeLoose file permissionsManual paginationIncorrect string equality operatorInefficient chain of AWS API callsOS command injectionInternationalizationCode cloneSQL injectionMissing check on method outputMissing paginationResources used by an Amazon S3 TransferManager are not releasedInsecure cryptographyMissing timezone of SimpleDateFormatLow maintainability with low class cohesionOversynchronizationInfinite loopBatch operations preferred over loopingObject Input Stream Insecure DeserializationWeak pseudorandom number generationInsecure CORS policyMissing handling of file deletion resultAmazon SQS message visibility changed without a status checkState machine execution ARN is not loggedClient-side KMS reencryptionUse Stream::anyMatch instead of Stream::findFirst or Stream::findAnyBatch request with unchecked failures

Tags

a
# access-control# amazon-dynamodb# amazon-ec2# amazon-kinesis# amazon-s3# amazon-sqs# android# availability# aws# aws-iam# aws-java-sdk# aws-kms# aws-lambda# aws-region
b
# batch-operations
c
# concurrency# configuration# consistency# cookies# cryptography
d
# data-integrity
e
# efficiency
i
# information-leak# injection# internationalization
l
# ldap
m
# maintainability
n
# networking# null-check
o
# owasp-top10
r
# race-condition# resource-leak
s
# secrets# security-context# sql# subprocess
t
# top25-cwes
x
# xml