By following the CERT C Secure Coding Standard, developers will be
able to fully or partially prevent the weaknesses that are identified in
this view. In addition, developers can use a CWE coverage graph to
determine which weaknesses are not directly addressed by the standard,
which will help identify and resolve remaining gaps in training, tool
acquisition, or o ...
Weaknesses in this category are related to rules in the
declarations and initialization section of the CERT C Secure Coding Standard.
Since not all rules map to specific weaknesses, this category may be incomplete.