CERT C Rules and Recommendations
CERT C is a set of code guidelines for software developers. It focuses on
secure coding in the C language. The guidelines
help eliminate constructs that have undefined behavior, which can lead to unexpected
results at runtime and expose security weaknesses. The
CERT C website, under continuous development, lists various
rules and recommendations. To check Polyspace coverage of CERT C rules and recommendations, see Polyspace Support for Coding Standards. Use the
Check SEI
CERT-C (-cert-c)
analysis option to activate subsets of the rules
and recommendations.
Polyspace Results
CERT C Rules
Rule 01. Preprocessor (PRE)
CERT C: Rule PRE30-C | Do not create a universal character name through concatenation |
CERT C: Rule PRE31-C | Avoid side effects in arguments to unsafe macros |
CERT C: Rule PRE32-C | Do not use preprocessor directives in invocations of function-like macros |
Rule 02. Declarations and Initialization (DCL)
CERT C: Rule DCL30-C | Declare objects with appropriate storage durations |
CERT C: Rule DCL31-C | Declare identifiers before using them |
CERT C: Rule DCL36-C | Do not declare an identifier with conflicting linkage classifications |
CERT C: Rule DCL37-C | Do not declare or define a reserved identifier |
CERT C: Rule DCL38-C | Use the correct syntax when declaring a flexible array member |
CERT C: Rule DCL39-C | Avoid information leakage in structure padding |
CERT C: Rule DCL40-C | Do not create incompatible declarations of the same function or object |
CERT C: Rule DCL41-C | Do not declare variables inside a switch statement before the first case label |
Rule 03. Expressions (EXP)
CERT C: Rule EXP30-C | Do not depend on the order of evaluation for side effects |
CERT C: Rule EXP32-C | Do not access a volatile object through a nonvolatile reference |
CERT C: Rule EXP33-C | Do not read uninitialized memory |
CERT C: Rule EXP34-C | Do not dereference null pointers |
CERT C: Rule EXP35-C | Do not modify objects with temporary lifetime |
CERT C: Rule EXP36-C | Do not cast pointers into more strictly aligned pointer types |
CERT C: Rule EXP37-C | Call functions with the correct number and type of arguments |
CERT C: Rule EXP39-C | Do not access a variable through a pointer of an incompatible type |
CERT C: Rule EXP40-C | Do not modify constant objects |
CERT C: Rule EXP42-C | Do not compare padding data |
CERT C: Rule EXP43-C | Avoid undefined behavior when using restrict-qualified pointers |
CERT C: Rule EXP44-C | Do not rely on side effects in operands to sizeof, _Alignof, or _Generic |
CERT C: Rule EXP45-C | Do not perform assignments in selection statements |
CERT C: Rule EXP46-C | Do not use a bitwise operator with a Boolean-like operand |
CERT C: Rule EXP47-C | Do not call va_arg with an argument of the incorrect type |
Rule 04. Integers (INT)
CERT C: Rule INT30-C | Ensure that unsigned integer operations do not wrap |
CERT C: Rule INT31-C | Ensure that integer conversions do not result in lost or misinterpreted data |
CERT C: Rule INT32-C | Ensure that operations on signed integers do not result in overflow |
CERT C: Rule INT33-C | Ensure that division and remainder operations do not result in divide-by-zero errors |
CERT C: Rule INT34-C | Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand |
CERT C: Rule INT35-C | Use correct integer precisions |
CERT C: Rule INT36-C | Converting a pointer to integer or integer to pointer |
Rule 05. Floating Point (FLP)
CERT C: Rule FLP30-C | Do not use floating-point variables as loop counters |
CERT C: Rule FLP32-C | Prevent or detect domain and range errors in math functions |
CERT C: Rule FLP34-C | Ensure that floating-point conversions are within range of the new type |
CERT C: Rule FLP36-C | Preserve precision when converting integral values to floating-point type |
CERT C: Rule FLP37-C | Do not use object representations to compare floating-point values |
Rule 06. Arrays (ARR)
CERT C: Rule ARR30-C | Do not form or use out-of-bounds pointers or array subscripts |
CERT C: Rule ARR32-C | Ensure size arguments for variable length arrays are in a valid range |
CERT C: Rule ARR36-C | Do not subtract or compare two pointers that do not refer to the same array |
CERT C: Rule ARR37-C | Do not add or subtract an integer to a pointer to a non-array object |
CERT C: Rule ARR38-C | Guarantee that library functions do not form invalid pointers |
CERT C: Rule ARR39-C | Do not add or subtract a scaled integer to a pointer |
Rule 07. Characters and Strings (STR)
CERT C: Rule STR30-C | Do not attempt to modify string literals |
CERT C: Rule STR31-C | Guarantee that storage for strings has sufficient space for character data and the null terminator |
CERT C: Rule STR32-C | Do not pass a non-null-terminated character sequence to a library function that expects a string |
CERT C: Rule STR34-C | Cast characters to unsigned char before converting to larger integer sizes |
CERT C: Rule STR37-C | Arguments to character-handling functions must be representable as an unsigned char |
CERT C: Rule STR38-C | Do not confuse narrow and wide character strings and functions |
Rule 08. Memory Management (MEM)
CERT C: Rule MEM30-C | Do not access freed memory |
CERT C: Rule MEM31-C | Free dynamically allocated memory when no longer needed |
CERT C: Rule MEM33-C | Allocate and copy structures containing a flexible array member dynamically |
CERT C: Rule MEM34-C | Only free memory allocated dynamically |
CERT C: Rule MEM35-C | Allocate sufficient memory for an object |
CERT C: Rule MEM36-C | Do not modify the alignment of objects by calling realloc() |
Rule 09. Input Output (FIO)
CERT C: Rule FIO30-C | Exclude user input from format strings |
CERT C: Rule FIO32-C | Do not perform operations on devices that are only appropriate for files |
CERT C: Rule FIO34-C | Distinguish between characters read from a file and EOF or WEOF |
CERT C: Rule FIO37-C | Do not assume that fgets() or fgetws() returns a nonempty string when successful |
CERT C: Rule FIO38-C | Do not copy a FILE object |
CERT C: Rule FIO39-C | Do not alternately input and output from a stream without an intervening flush or positioning call |
CERT C: Rule FIO40-C | Reset strings on fgets() or fgetws() failure |
CERT C: Rule FIO41-C | Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects |
CERT C: Rule FIO42-C | Close files when they are no longer needed |
CERT C: Rule FIO44-C | Only use values for fsetpos() that are returned from fgetpos() |
CERT C: Rule FIO45-C | Avoid TOCTOU race conditions while accessing files |
CERT C: Rule FIO46-C | Do not access a closed file |
CERT C: Rule FIO47-C | Use valid format strings |
Rule 10. Environment (ENV)
CERT C: Rule ENV30-C | Do not modify the object referenced by the return value of certain functions |
CERT C: Rule ENV31-C | Do not rely on an environment pointer following an operation that may invalidate it |
CERT C: Rule ENV32-C | All exit handlers must return normally |
CERT C: Rule ENV33-C | Do not call system() |
CERT C: Rule ENV34-C | Do not store pointers returned by certain functions |
Rule 11. Signals (SIG)
CERT C: Rule SIG30-C | Call only asynchronous-safe functions within signal handlers |
CERT C: Rule SIG31-C | Do not access shared objects in signal handlers |
CERT C: Rule SIG34-C | Do not call signal() from within interruptible signal handlers |
CERT C: Rule SIG35-C | Do not return from a computational exception signal handler |
Rule 12. Error Handling (ERR)
CERT C: Rule ERR30-C | Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure |
CERT C: Rule ERR32-C | Do not rely on indeterminate values of errno |
CERT C: Rule ERR33-C | Detect and handle standard library errors |
CERT C: Rule ERR34-C | Detect errors when converting a string to a number |
Rule 14. Concurrency (CON)
CERT C: Rule CON30-C | Clean up thread-specific storage |
CERT C: Rule CON31-C | Do not destroy a mutex while it is locked |
CERT C: Rule CON32-C | Prevent data races when accessing bit fields from multiple threads |
CERT C: Rule CON33-C | Avoid race conditions when using library functions |
CERT C: Rule CON34-C | Declare objects shared between threads with appropriate storage durations (Since R2020a) |
CERT C: Rule CON35-C | Avoid deadlock by locking in a predefined order |
CERT C: Rule CON36-C | Wrap functions that can spuriously wake up in a loop |
CERT C: Rule CON37-C | Do not call signal() in a multithreaded program |
CERT C: Rule CON38-C | Preserve thread safety and liveness when using condition variables (Since R2020a) |
CERT C: Rule CON39-C | Do not join or detach a thread that was previously joined or detached |
CERT C: Rule CON40-C | Do not refer to an atomic variable twice in an expression |
CERT C: Rule CON41-C | Wrap functions that can fail spuriously in a loop |
CERT C: Rule CON43-C | Do not allow data races in multithreaded code |
Rule 48. Miscellaneous (MSC)
CERT C: Rule MSC30-C | Do not use the rand() function for generating pseudorandom numbers |
CERT C: Rule MSC32-C | Properly seed pseudorandom number generators |
CERT C: Rule MSC33-C | Do not pass invalid data to the asctime() function |
CERT C: Rule MSC37-C | Ensure that control never reaches the end of a non-void function |
CERT C: Rule MSC38-C | Do not treat a predefined identifier as an object if it might only be implemented as a macro |
CERT C: Rule MSC39-C | Do not call va_arg() on a va_list that has an indeterminate value |
CERT C: Rule MSC40-C | Do not violate constraints |
CERT C: Rule MSC41-C | Never hard code sensitive information (Since R2020a) |
Rule 50. POSIX (POS)
CERT C: Rule POS30-C | Use the readlink() function properly |
CERT C: Rule POS34-C | Do not call putenv() with a pointer to an automatic variable as the argument |
CERT C: Rule POS35-C | Avoid race conditions while checking for the existence of a symbolic link |
CERT C: Rule POS36-C | Observe correct revocation order while relinquishing privileges |
CERT C: Rule POS37-C | Ensure that privilege relinquishment is successful |
CERT C: Rule POS38-C | Beware of race conditions when using fork and file descriptors |
CERT C: Rule POS39-C | Use the correct byte ordering when transferring data between systems |
CERT C: Rule POS44-C | Do not use signals to terminate threads |
CERT C: Rule POS47-C | Do not use threads that can be canceled asynchronously (Since R2020a) |
CERT C: Rule POS48-C | Do not unlock or destroy another POSIX thread's mutex |
CERT C: Rule POS49-C | When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed |
CERT C: Rule POS50-C | Declare objects shared between POSIX threads with appropriate storage durations (Since R2020a) |
CERT C: Rule POS51-C | Avoid deadlock with POSIX threads by locking in predefined order |
CERT C: Rule POS52-C | Do not perform operations that can block while holding a POSIX lock |
CERT C: Rule POS53-C | Do not use more than one mutex for concurrent waiting operations on a condition variable (Since R2020a) |
CERT C: Rule POS54-C | Detect and handle POSIX library errors |
Rule 51. Microsoft Windows (WIN)
CERT C: Rule WIN30-C | Properly pair allocation and deallocation functions |
CERT C Recommendations
Rec. 01. Preprocessor (PRE)
CERT C: Rec.
PRE00-C | Prefer inline or static functions to function-like macros |
CERT C: Rec.
PRE01-C | Use parentheses within macros around parameter names |
CERT C: Rec.
PRE03-C | Prefer typedefs to defines for encoding non-pointer type (Since R2024a) |
CERT C: Rec.
PRE05-C | Understand macro replacement when concatenating tokens or performing stringification (Since R2024b) |
CERT C: Rec.
PRE06-C | Enclose header files in an inclusion guard |
CERT C: Rec.
PRE07-C | Avoid using repeated question marks |
CERT C: Rec.
PRE08-C | Guarantee that header file names are unique (Since R2024a) |
CERT C: Rec.
PRE09-C | Do not replace secure functions with deprecated or obsolescent functions |
CERT C: Rec.
PRE10-C | Wrap multistatement macros in a do-while loop (Since R2020a) |
CERT C: Rec.
PRE11-C | Do not conclude macro definitions with a semicolon (Since R2020a) |
CERT C: Rec.
PRE12-C | Do not define unsafe macros (Since R2024a) |
Rec. 02. Declarations and Initialization (DCL)
CERT C: Rec.
DCL00-C | Const-qualify immutable objects (Since R2020b) |
CERT C: Rec.
DCL01-C | Do not reuse variable names in subscopes |
CERT C: Rec.
DCL02-C | Use visually distinct identifiers |
CERT C: Rec.
DCL06-C | Use meaningful symbolic constants to represent literal values |
CERT C: Rec.
DCL07-C | Include the appropriate type information in function declarators |
CERT C: Rec.
DCL10-C | Maintain the contract between the writer and caller of variadic functions |
CERT C: Rec.
DCL11-C | Understand the type issues associated with variadic functions |
CERT C: Rec.
DCL12-C | Implement abstract data types using opaque types |
CERT C: Rec.
DCL13-C | Declare function parameters that are pointers to values not changed by the function as const |
CERT C: Rec.
DCL15-C | Declare file-scope objects or functions that do not need external linkage as static |
CERT C: Rec.
DCL16-C | Use 'L,' not 'l,' to indicate a long value |
CERT C: Rec.
DCL18-C | Do not begin integer constants with 0 when specifying a decimal value |
CERT C: Rec.
DCL19-C | Minimize the scope of variables and functions |
CERT C: Rec.
DCL21-C | Understand the storage of compound literals (Since R2024b) |
CERT C: Rec.
DCL22-C | Use volatile for data that cannot be cached |
CERT C: Rec.
DCL23-C | Guarantee that mutually visible identifiers are unique |
Rec. 03. Expressions (EXP)
CERT C: Rec.
EXP00-C | Use parentheses for precedence of operation |
CERT C: Rec.
EXP05-C | Do not cast away a const qualification |
CERT C: Rec.
EXP07-C | Do not diminish the benefits of constants by assuming their values in expressions (Since R2024a) |
CERT C: Rec.
EXP08-C | Ensure pointer arithmetic is used correctly |
CERT C: Rec.
EXP09-C | Use sizeof to determine the size of a type or variable |
CERT C: Rec.
EXP10-C | Do not depend on the order of evaluation of subexpressions or the order in which side effects take place |
CERT C: Rec.
EXP11-C | Do not make assumptions regarding the layout of structures with bit-fields (Since R2024b) |
CERT C: Rec.
EXP12-C | Do not ignore values returned by functions |
CERT C: Rec.
EXP13-C | Treat relational and equality operators as if they were nonassociative |
CERT C: Rec.
EXP15-C | Do not place a semicolon on the same line as an if, for, or while statement (Since R2020a) |
CERT C: Rec.
EXP19-C | Use braces for the body of an if, for, or while statement |
Rec. 04. Integers (INT)
CERT C: Rec. INT00-C | Understand the data model used by your implementation(s) |
CERT C: Rec. INT02-C | Understand integer conversion rules |
CERT C: Rec. INT04-C | Enforce limits on integer values originating from tainted sources |
CERT C: Rec. INT07-C | Use only explicitly signed or unsigned char type for numeric values |
CERT C: Rec. INT08-C | Verify that all integer values are in range |
CERT C: Rec. INT09-C | Ensure enumeration constants map to unique values |
CERT C: Rec. INT10-C | Do not assume a positive remainder when using the % operator |
CERT C: Rec. INT12-C | Do not make assumptions about the type of a plain int bit-field when used in an expression |
CERT C: Rec. INT13-C | Use bitwise operators only on unsigned operands |
CERT C: Rec. INT14-C | Avoid performing bitwise and arithmetic operations on the same data |
CERT C: Rec. INT18-C | Evaluate integer expressions in a larger size before comparing or assigning to that size |
Rec. 05. Floating Point (FLP)
CERT C: Rec. FLP00-C | Understand the limitations of floating-point numbers |
CERT C: Rec. FLP02-C | Avoid using floating-point numbers when precise computation is needed |
CERT C: Rec. FLP03-C | Detect and handle floating-point errors |
CERT C: Rec. FLP06-C | Convert integers to floating point for floating-point operations |
Rec. 06. Arrays (ARR)
CERT C: Rec. ARR01-C | Do not apply the sizeof operator to a pointer when taking the size of an array |
CERT C: Rec. ARR02-C | Explicitly specify array bounds, even if implicitly defined by an initializer |
Rec. 07. Characters and Strings (STR)
CERT C: Rec. STR02-C | Sanitize data passed to complex subsystems |
CERT C: Rec. STR03-C | Do not inadvertently truncate a string |
CERT C: Rec. STR07-C | Use the bounds-checking interfaces for string manipulation |
CERT C: Rec. STR11-C | Do not specify the bound of a character array initialized with a string literal |
Rec. 08. Memory Management (MEM)
CERT C: Rec. MEM00-C | Allocate and free memory in the same module, at the same level of abstraction |
CERT C: Rec. MEM01-C | Store a new value in pointers immediately after free() |
CERT C: Rec. MEM02-C | Immediately cast the result of a memory allocation function call into a pointer to the allocated type |
CERT C: Rec. MEM03-C | Clear sensitive information stored in reusable resources |
CERT C: Rec. MEM04-C | Beware of zero-length allocations |
CERT C: Rec. MEM05-C | Avoid large stack allocations |
CERT C: Rec. MEM06-C | Ensure that sensitive data is not written out to disk |
CERT C: Rec. MEM11-C | Do not assume infinite heap space |
CERT C: Rec. MEM12-C | Consider using a goto chain when leaving a function on error when using and releasing resources |
Rec. 09. Input Output (FIO)
CERT C: Rec. FIO02-C | Canonicalize path names originating from tainted sources |
CERT C: Rec. FIO03-C | Do not make assumptions about fopen() and file creation (Since R2024a) |
CERT C: Rec. FIO06-C | Create files with appropriate access permissions (Since R2024b) |
CERT C: Rec. FIO08-C | Take care when calling remove() on an open file (Since R2024b) |
CERT C: Rec. FIO10-C | Take care when using the rename() function (Since R2024b) |
CERT C: Rec. FIO11-C | Take care when specifying the mode parameter of fopen() |
CERT C: Rec. FIO21-C | Do not create temporary files in shared directories |
CERT C: Rec. FIO24-C | Do not open a file that is already open |
Rec. 10. Environment (ENV)
CERT C: Rec. ENV01-C | Do not make assumptions about the size of an environment variable |
Rec. 12. Error Handling (ERR)
CERT C: Rec. ERR00-C | Adopt and implement a consistent and comprehensive error-handling policy |
Rec. 13. Application Programming Interfaces (API)
CERT C: Rec. API04-C | Provide a consistent and usable error-checking mechanism |
Rec. 14. Concurrency (CON)
CERT C: Rec. CON01-C | Acquire and release synchronization primitives in the same module, at the same level of abstraction |
CERT C: Rec. CON05-C | Do not perform operations that can block while holding a lock |
Rec. 48. Miscellaneous (MSC)
CERT C: Rec. MSC01-C | Strive for logical completeness |
CERT C: Rec. MSC04-C | Use comments consistently and in a readable fashion |
CERT C: Rec. MSC12-C | Detect and remove code that has no effect or is never executed |
CERT C: Rec. MSC13-C | Detect and remove unused values |
CERT C: Rec. MSC15-C | Do not depend on undefined behavior |
CERT C: Rec. MSC17-C | Finish every set of statements associated with a case label with a break statement |
CERT C: Rec. MSC18-C | Be careful while handling sensitive data, such as passwords, in program code |
CERT C: Rec. MSC20-C | Do not use a switch statement to transfer control into a complex block |
CERT C: Rec. MSC21-C | Use robust loop termination conditions |
CERT C: Rec. MSC22-C | Use the setjmp(), longjmp() facility securely |
CERT C: Rec. MSC24-C | Do not use deprecated or obsolescent functions |
Rec. 50. POSIX (POS)
CERT C: Rec. POS05-C | Limit access to files by creating a jail |
Rec. 51. Microsoft Windows (WIN)
CERT C: Rec. WIN00-C | Be specific when dynamically loading libraries |
Topics
- Polyspace Support for Coding Standards
Check the Polyspace support for different coding standards.
- Check for and Review Coding Standard Violations
Check for violations of AUTOSAR C++14, CERT® C, CERT C++, CWE, MISRA C™, MISRA™ C++, JSF AV C++, or ISO-17961 standards with Polyspace Bug Finder.
- Required and Statically Enforceable CERT C Rules Supported by Polyspace Bug Finder
List of CERT C rules that are supported by Polyspace.
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Select a Web Site
Choose a web site to get translated content where available and see local events and offers. Based on your location, we recommend that you select: .
You can also select a web site from the following list
How to Get Best Site Performance
Select the China site (in Chinese or English) for best site performance. Other MathWorks country sites are not optimized for visits from your location.
Americas
- América Latina (Español)
- Canada (English)
- United States (English)
Europe
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)
Asia Pacific
- Australia (English)
- India (English)
- New Zealand (English)
- 中国
- 日本Japanese (日本語)
- 한국Korean (한국어)