SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
Apex

Apex static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your APEX code

  • All rules 97
  • Vulnerability2
  • Bug26
  • Security Hotspot3
  • Code Smell66
Filtered: 13 rules found
convention
    Impact
      Clean code attribute
        1. Custom exception classes should follow proper naming conventions

           Code Smell
        2. Loops should use braces

           Code Smell
        3. Constants should use SNAKE_CASE with all uppercase letters

           Code Smell
        4. Apex classes and methods should have explicit access modifiers

           Code Smell
        5. Test classes should be annotated with "@isTest"

           Code Smell
        6. Custom event names should not be prefixed with "on"

           Code Smell
        7. Track lack of copyright and license headers

           Code Smell
        8. Statements should be on separate lines

           Code Smell
        9. Local variable and method parameter names should comply with a naming convention

           Code Smell
        10. Tabulation characters should not be used

           Code Smell
        11. Lines should not be too long

           Code Smell
        12. Class names should comply with a naming convention

           Code Smell
        13. Function names should comply with a naming convention

           Code Smell

        Apex classes and methods should have explicit access modifiers

        consistency - conventional
        maintainability
        Code Smell
        • convention

        This rule raises an issue when Apex classes or methods lack explicit access modifiers (private, public, or global).

        Why is this an issue?

        How can I fix it?

        More Info

        In Apex, classes and methods without explicit access modifiers default to package-private visibility. This implicit behavior can lead to several problems:

        Security concerns: Without explicit modifiers, you might unintentionally expose sensitive functionality or data to other classes in the same package. This creates potential security vulnerabilities where unauthorized code could access methods that should be private.

        Unclear intent: When access modifiers are missing, it’s unclear whether the developer intended the default visibility or simply forgot to specify it. This ambiguity makes code harder to understand and maintain.

        Maintenance difficulties: As your codebase grows, implicit access levels make it harder to understand the intended API boundaries. This can lead to tight coupling between classes and make refactoring more difficult.

        Code review challenges: Without explicit modifiers, reviewers cannot easily verify that the access level matches the intended design, potentially allowing inappropriate access patterns to slip through.

        Explicit access modifiers serve as documentation of your design intent and help enforce proper encapsulation principles.

        What is the potential impact?

        Missing access modifiers can lead to unintended exposure of sensitive methods or data, creating security vulnerabilities. It also reduces code maintainability and makes it harder for teams to understand and modify the codebase safely.

          Available In:
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories

        © 2008-2025 SonarSource SA. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use