Source
152. Reuse database connections173. Discard unsafe inputs154. Eliminate backdoors174. Transactions without a distinguishable pattern155. Application free of malicious code175. Protect pages from clickjacking156. Source code without sensitive information302. Declare dependencies explicitly158. Use a secure programming language323. Exclude unverifiable files159. Obfuscate code337. Make critical logic flows thread safe160. Encode system outputs342. Validate request parameters161. Define secure default options344. Avoid dynamic code execution164. Use optimized structures345. Establish protections against overflows167. Close unused resources359. Avoid using generic exceptions168. Initialize variables explicitly366. Associate type to variables169. Use parameterized queries379. Keep low McCabe cyclomatic complexity172. Encrypt connection strings381. Use of absolute paths