This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Inner classes"

From OWASP
Jump to: navigation, search
 
(3 intermediate revisions by one other user not shown)
Line 1: Line 1:
Inner classes have been called "dangerous" by several Java security guidelines. However, there is no additional danger inherent in the use of inner classes that is not inherent in the use of other types of polymorphism. In general, use as little polymorphism as possible since it, by default, it exposes data.
+
[[OWASP Code Review Guide Table of Contents]]__TOC__ <br>
 +
Inner classes have been called "dangerous" by several Java security guidelines. However, there is no additional danger inherent in the use of inner classes that is not inherent in the use of other types of polymorphism. In general, use as little polymorphism as possible since it, by definition, it exposes data.
  
Java Security Researcher Tom Hawtin sums up the "danger" of inner classes in his blog at http://jroller.com/page/tackline in just one word: "Bollocks".
+
Java Security Researcher Tom Hawtin sums up the "danger" of inner classes in his blog at http://jroller.com/page/tackline
 +
[[Category:OWASP Code Review Project]]

Latest revision as of 11:17, 19 January 2007

OWASP Code Review Guide Table of Contents
Inner classes have been called "dangerous" by several Java security guidelines. However, there is no additional danger inherent in the use of inner classes that is not inherent in the use of other types of polymorphism. In general, use as little polymorphism as possible since it, by definition, it exposes data.

Java Security Researcher Tom Hawtin sums up the "danger" of inner classes in his blog at http://jroller.com/page/tackline