Missing Support for Integrity Check
Last updated
Last updated
Rule ID: java_lang_missing_integrity_check
Applicable Languages: Java
Weakness ID: CWE-353
Without integrity checks ("checksums"), a protocol lacks the means to detect if transmitted data has been tampered with or altered by unauthorized parties, such as in a Man-in-the-Middle attack. This complicates the ability to verify the integrity of transmitted data.
Employ encryption schemes that incorporate integrity checks to verify that data has not been altered during transmission.
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our