SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
Java

Java static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your JAVA code

  • All rules 733
  • Vulnerability60
  • Bug175
  • Security Hotspot40
  • Code Smell458

  • Quick Fix 65
Filtered: 20 rules found
bad-practice
    Impact
      Clean code attribute
        1. Similar tests should be grouped in a single Parameterized test

           Code Smell
        2. An iteration on a Collection should be performed on the type handled by the Collection

           Code Smell
        3. "enum" fields should not be publicly mutable

           Code Smell
        4. "Thread.sleep" should not be used in tests

           Code Smell
        5. Formatting SQL queries is security-sensitive

           Security Hotspot
        6. Loops with at most one iteration should be refactored

           Bug
        7. JUnit4 @Ignored and JUnit5 @Disabled annotations should be used to disable tests and should provide a rationale

           Code Smell
        8. Declarations should use Java collection interfaces such as "List" rather than specific implementation classes such as "LinkedList"

           Code Smell
        9. Track uses of "CHECKSTYLE:OFF" suppression comments

           Code Smell
        10. Track uses of "NOPMD" suppression comments

           Code Smell
        11. "switch" statements should have at least 3 "case" clauses

           Code Smell
        12. Track uses of "NOSONAR" comments

           Code Smell
        13. Execution of the Garbage Collector should be triggered only by the JVM

           Code Smell
        14. Interfaces should not solely consist of constants

           Code Smell
        15. Nested code blocks should not be used

           Code Smell
        16. Throwable and Error should not be caught

           Code Smell
        17. "@Override" should be used on overriding and implementing methods

           Code Smell
        18. Strings literals should be placed on the left side when checking for equality

           Code Smell
        19. Deprecated elements should have both the annotation and the Javadoc tag

           Code Smell
        20. Standard outputs should not be used directly to log anything

           Code Smell

        Declarations should use Java collection interfaces such as "List" rather than specific implementation classes such as "LinkedList"

        consistency - conventional
        maintainability
        Code Smell
        Quick FixIDE quick fixes available with SonarQube for IDE
        • bad-practice

        This rule raises an issue when a collection implementation class from java.util.* is used:

        • as a return type of a public method.
        • as an argument type of a public method.
        • as the type of a public field.

        Why is this an issue?

        The Java Collections API offers a well-structured hierarchy of interfaces designed to hide collection implementation details. For the various collection data structures like lists, sets, and maps, specific interfaces (java.util.List, java.util.Set, java.util.Map) cover the essential features.

        When passing collections as method parameters, return values, or when exposing fields, it is generally recommended to use these interfaces instead of the implementing classes. The implementing classes, such as java.util.LinkedList, java.util.ArrayList, and java.util.HasMap, should only be used for collection instantiation. They provide finer control over the performance characteristics of those structures, and developers choose them depending on their use case.

        For example, if fast random element access is essential, java.util.ArrayList should be instantiated. If inserting elements at a random position into a list is crucial, a java.util.LinkedList should be preferred. However, this is an implementation detail your API should not expose.

        Code examples

        Noncompliant code example

        public class Employees {
          public final HashSet<Employee> employees   // Noncompliant, field type should be "Set"
            = new HashSet<Employee>();
        
          public HashSet<Employee> getEmployees() {  // Noncompliant, return type should be "Set"
            return employees;
          }
        }
        

        Compliant solution

        public class Employees {
          public final Set<Employee> employees       // Compliant
            = new HashSet<Employee>();
        
          public Set<Employee> getEmployees() {      // Compliant
            return employees;
          }
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube Community BuildAnalyze code in your
          on-premise CI
          Available Since
          9.1
        • SonarQube ServerAnalyze code in your
          on-premise CI
          Developer Edition
          Available Since
          9.1

        © 2008-2025 SonarSource SA. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use