Source
152. Reuse database connections172. Encrypt connection strings154. Eliminate backdoors173. Discard unsafe inputs155. Application free of malicious code174. Transactions without a distinguishable pattern156. Source code without sensitive information175. Protect pages from clickjacking157. Use the strict mode302. Declare dependencies explicitly158. Use a secure programming language323. Exclude unverifiable files159. Obfuscate code337. Make critical logic flows thread safe160. Encode system outputs342. Validate request parameters161. Define secure default options344. Avoid dynamic code execution164. Use optimized structures345. Establish protections against overflows167. Close unused resources359. Avoid using generic exceptions168. Initialize variables explicitly366. Associate type to variables169. Use parameterized queries379. Keep low McCabe cyclomatic complexity171. Remove commented-out code381. Use of absolute paths