SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
C++

C++ static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your C++ code

  • All rules 674
  • Vulnerability13
  • Bug139
  • Security Hotspot19
  • Code Smell503

  • Quick Fix 91
Filtered: 12 rules found
error-handling
    Impact
      Clean code attribute
        1. Move and swap operations should be "noexcept"

           Code Smell
        2. Exceptions should not be thrown in "noexcept" functions

           Code Smell
        3. Non-exception types should not be caught

           Code Smell
        4. Non-exception types should not be thrown

           Code Smell
        5. Destructors should be "noexcept"

           Bug
        6. General "catch" clauses should not be used

           Code Smell
        7. "catch" clauses should do more than rethrow

           Code Smell
        8. Exceptions should not be ignored

           Code Smell
        9. Exception specifications should not be used

           Code Smell
        10. Generic exceptions should not be caught

           Code Smell
        11. Try-catch blocks should not be nested

           Code Smell
        12. Generic exceptions should never be thrown

           Code Smell

        Generic exceptions should never be thrown

        intentionality - complete
        maintainability
        Code Smell
        • cwe
        • error-handling
        • cppcoreguidelines
        • cert

        This rule raises an issue when a generic exception (such as std::exception, std::logic_error or std::runtime_error) is thrown.

        Why is this an issue?

        How can I fix it?

        More Info

        Throwing generic exceptions such as std::exception, std::logic_error and std::runtime_error will have a negative impact on any code trying to catch these exceptions.

        From a consumer perspective, it is generally a best practice to only catch exceptions you intend to handle. Other exceptions should ideally not be caught and let propagate up the stack trace so that they can be dealt with appropriately. When a generic exception is thrown, it forces consumers to catch exceptions they do not intend to handle, which they then have to re-throw.

        Besides, when working with a generic type of exception, the only way to distinguish between multiple exceptions is to check their message, which is error-prone and difficult to maintain. Legitimate exceptions may be unintentionally silenced and errors may be hidden.

        For instance, in the following code, the fact that checkState throws a generic exception leads us to catch a permission error that shouldn’t have been caught:

        void openFile(File& file) {
          if (!has_permissions(file)) {
            throw std::invalid_argument("Couldn't open file");
          }
          // ...
        }
        
        void checkState(File const& file) {
          if (!file.is_valid()) {
            throw std::exception();  // Noncompliant
          }
          // ...
        }
        
        void test(File file) {
          try {
            openFile(file);
            checkState(false);
            closeFile(file);
          } catch (std::exception& s) {
            // If we don't have the correct permissions to open, the
            // invalid_argument exception will be caught and we will try closing a
            // file that was never opened
            closeFile(file);
          }
        }
        

        Therefore, throwing the most specific exception possible is recommended so consumers can handle it intentionally.

          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube ServerAnalyze code in your
          on-premise CI
          Developer Edition
          Available Since
          9.1

        © 2008-2025 SonarSource SA. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use