SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C++

C++ static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C++ code

  • All rules 674
  • Vulnerability13
  • Bug139
  • Security Hotspot19
  • Code Smell503

  • Quick Fix 91
Filtered: 55 rules found
bad-practice
    Impact
      Clean code attribute
        1. Pointer and reference parameters should be "const" if the corresponding object is not modified

           Code Smell
        2. Reserved identifiers should not be defined or declared

           Code Smell
        3. Only standard forms of the "defined" directive should be used

           Code Smell
        4. Function-like macros should not be used

           Code Smell
        5. Recursion should not be used

           Code Smell
        6. "continue" should not be used

           Code Smell
        7. Bitwise operators should not be applied to signed operands

           Bug
        8. Escape sequences should use the delimited form (\u{}, \o{}, \x{})

           Code Smell
        9. Names of well-known C standard library macros and functions should not be used as identifiers

           Code Smell
        10. C++ formatting functions should be used instead of C printf-like functions

           Code Smell
        11. Use "std::format" rather than "std::vformat" when the format string is known at compile time

           Code Smell
        12. Template should not be constrained with ad-hoc requires-expression

           Code Smell
        13. Use type-erased "coroutine_handle" when applicable

           Code Smell
        14. Well-defined type-punning method should be used instead of a union-based one

           Bug
        15. "std::cmp_*" functions should be used to compare unsigned values with negative values

           Bug
        16. STL constrained algorithms with range parameter should be used when iterating over the entire range

           Code Smell
        17. "std::cmp_*" functions should be used to compare signed and unsigned values

           Code Smell
        18. "std::bit_cast" should be used to reinterpret binary representation instead of "std::memcpy"

           Code Smell
        19. "[[likely]]" and "[[unlikely]]" should be used instead of compiler built-ins

           Code Smell
        20. "starts_with" and "ends_with" should be used for prefix and postfix checks

           Code Smell
        21. "std::jthread" should be used instead of "std::thread"

           Code Smell
        22. "nodiscard" attributes on functions should include explanations

           Code Smell
        23. "std::endl" should not be used

           Code Smell
        24. C-style array should not be used

           Code Smell
        25. Macros should not be used as replacements for "typedef" and "using"

           Code Smell
        26. Integer literals should not be cast to bool

           Code Smell
        27. Multiple mutexes should not be acquired with individual locks

           Code Smell
        28. "try_lock", "lock" and "unlock" should not be directly used for mutexes

           Code Smell
        29. A single statement should not have more than one resource allocation

           Code Smell
        30. Function parameters that are rvalue references should be moved

           Code Smell
        31. Capture by reference in lambdas used locally

           Code Smell
        32. Size of bit fields should not exceed the size of their types

           Code Smell
        33. Functions should not have more than one argument of type "bool"

           Code Smell
        34. Non-const global variables should not be used

           Code Smell
        35. The order for arguments of the same type in a function call should be obvious

           Code Smell
        36. "std::move" should only be used where moving can happen

           Code Smell
        37. Classes should not contain both public and private data members

           Code Smell
        38. Pointer and reference local variables should be "const" if the corresponding object is not modified

           Code Smell
        39. Argument of "printf" should be a format string

           Code Smell
        40. Template parameters should be preferred to "std::function" when configuring behavior at compile time

           Code Smell
        41. Macros should not be used to define constants

           Code Smell
        42. Memory should not be managed manually

           Code Smell
        43. Function parameters should not be of type "std::unique_ptr<T> const &"

           Code Smell
        44. "nullptr" should be used to denote the null pointer

           Code Smell
        45. Exceptions should not be thrown in "noexcept" functions

           Code Smell
        46. Redundant lambda return types should be omitted

           Code Smell
        47. Member variables should be initialized

           Bug
        48. Loops with at most one iteration should be refactored

           Bug
        49. "if" statements should be preferred over "switch" when simpler

           Code Smell
        50. Track uses of "NOSONAR" comments

           Code Smell
        51. Generic exceptions should not be caught

           Code Smell
        52. Deprecated attributes should include explanations

           Code Smell
        53. Standard outputs should not be used directly to log anything

           Code Smell
        54. Classes should not be inherited virtually

           Code Smell
        55. The "union" keyword shall not be used

           Code Smell

        Member variables should be initialized

        intentionality - complete
        reliability
        Bug
        • symbolic-execution
        • bad-practice
        • pitfall

        Partially initialized objects are surprising to the class users and might lead to hard-to-catch bugs. classes with constructors are expected to have all members initialized after their constructor finishes.

        This rule raises an issue when some members are left uninitialized after a constructor finishes.

        Why is this an issue?

        How can I fix it?

        More Info

        In the following example, PartInit::x is left uninitialized after the constructor finishes.

        struct AutomaticallyInitialized {
          int x;
          AutomaticallyInitialized() : x(0) {}
        };
        
        struct PartInit {
          AutomaticallyInitialized ai;
          int x;
          int y;
          PartInit(int n) :y(n) {
            // this->ai is initialized
            // this->y is initialized
            // Noncompliant: this->x is left uninitialized
          }
        };
        

        This leads to undefined behavior in benign-looking code, like in the example below. In this particular case, garbage value may be printed, or a compiler may optimize away the print statement completely.

        PartInit pi(1);
        std::cout << pi.y; // Undefined behavior
        

        For this reason, constructors should always initialize all data members of a class.

        While in some cases, data members are initialized by their default constructor, in others, they are left with garbage.

        Types with a defaulted or implicit trivial default constructor follow the aggregate initialization syntax: if you omit them from the initialization list, they will not be initialized.

        struct Trivial {
          int x;
          int y;
        };
        struct Container {
          Trivial t;
          int arr[2];
          Container() {
            // Noncompliant
            // this->t is not initialized
            // this->t.x and this->t.y contain garbage
            // this->arr contains garbage
          }
          Container(int) :t{}, arr{} {
            // Compliant
            // this->t.x and this->t.y are initialized to 0
            // this->arr is initialized to {0, 0}
          }
          Container(int, int) :t{1}, arr{1} {
            // Compliant
            // this->t.x is 1
            // this->t.y is 0
            // this->arr is initialized to {1, 0}
          }
        };
        struct DefaultedContainer {
          Trivial t;
          int arr[2];
          DefaultedContainer() = default; // Noncompliant
          // this->t and this->arr are not initialized
        };
        

        The same is true for a defaulted default constructor.

        struct Defaulted {
          int x;
          Defaulted() = default;
        };
        struct ContainerDefaulted {
          Defaulted d;
          ContainerDefaulted() {
            // Noncompliant this->d.x is not initialized
          }
        };
        

        Even if some of the members have class initializers, the other members are still not initialized by default.

        struct Partial {
          int x;
          int y = 1;
          int z;
        };
        struct ContainerPartial {
          Partial p;
          ContainrePartial() {
            // Noncompliant
            // this->p.x is not initialized
            // this->p.y is initialized to 1
            // this->p.z is not initialized
          }
          ContainrePartial(bool) :p{3} {
            // Compliant
            // this->p.x is initialized to 3
            // this->p.y is initialized to 1
            // this->p.z is initialized to 0
          }
        };
        

        What is the potential impact?

        It is a common expectation that an object is in a fully-initialized state after its construction. A partially initialized object breaks this assumption.

        This comes with all the risks associated with uninitialized variables, and these risks propagate to all the classes using the faulty class as a type as a base class or a data member. This is all the more surprising that most programmers expect a constructor to correctly initialize the members of its class.

        Using garbage values will cause the program to behave nondeterministically at runtime. The program may produce a different output or crash depending on the run.

        In some situations, loading a variable may expose sensitive data, such as a password that was previously stored in the same location, leading to a vulnerability that uses such a defect as a gadget for extracting information from the instance of the program.

        Finally, in C++, outside of a few exceptions related to the uses of unsigned char or std::byte, loading data from an uninitialized variable causes undefined behavior. This means that the compiler is not bound by the language standard anymore, and the program has no meaning assigned to it. As a consequence, the impact of such a defect is not limited to the use of garbage values.

        Exceptions

        Aggregate classes do not initialize most of their data members (unless you explicitly value initialize them with x{} or x()) but allow their users to use nice and flexible initialization syntax. This rule ignores them.

          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI
          Developer Edition
          Available Since
          9.1

        © 2008-2025 SonarSource SA. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use