jwat

Severity

Blocker 0
Critical 19
Major 887
Minor 577
Info 11

Rule

Empty If Stmt 6
Dodgy - Dead store to local variable 4
Empty While Stmt 3
Security - Array is stored directly 3
Avoid Catching Throwable 1
Dodgy - Potentially dangerous use of non-short-circuit logic 1
Correctness - Possible null pointer dereference in method on exception path 1
Visibility Modifier 536
Cyclomatic Complexity 52
Parameter Assignment 47
Parameter Name 41
Member name 36
Ncss Method Count 32
Avoid Duplicate Literals 25
Malicious code vulnerability - Field should be package protected 19
Inefficient String Buffering 16
Local Variable Name 12
Malicious code vulnerability - Field should be both final and package protected 10
Method Name 10
Bad practice - Method might ignore exception 6
Simplify Conditional 5
Malicious code vulnerability - May expose internal representation by incorporating reference to mutable object 5
Malicious code vulnerability - Field isn't final but should be 5
Malicious code vulnerability - May expose internal representation by returning reference to mutable object 4
Avoid Print Stack Trace 4
Bad practice - Method ignores exceptional return value 3
Boolean Expression Complexity 2
Signature Declare Throws Exception 2
Preserve Stack Trace 2
Loose coupling 2
Anon Inner Length 2
Avoid Array Loops 2
Unused private method 2
System Println 1
Final Class 1
Bad practice - Method ignores results of InputStream.skip() 1
Inner Assignment 1
Default Comes Last 1
Magic Number 467
Line Length 66
Constant Name 17
Collapsible If Statements 14
Redundant Modifier 11
Redundant Throws 2
Unused Modifier 11
  Uri.java 2