Release date: October 16, 2020 Enhanced Static AnalysisWe've extended dotTEST's static analysis capabilities with new features to help you focus on the most expedient tasks. New Scoping Options to Target Modified Code on the Current BranchWe've added new options to create file filters that restrict the scope of analysis to files modified on your current working branch. This allows you to focus on identifying and fixing bugs introduced by your recent code changes before the code is merged with the main development stream. In addition, you can narrow down the scope to locally modified files so that you can analyze the code you updated before checking it into source control. See Defining File Filters Based on Source Control Data and Creating Custom Test Configurations. New Report Reference Options for Defining the Code Analysis BaselineYou can now specify a path or URL to a reference report file that will be used as a baseline when performing analysis with dotTEST. This allows you to exclude previously reported findings from the current report in order to focus on the most recently detected code defects. Configuring Reporting Options. Extended Security Compliance PackWe've added support for the newly updated Common Weakness Enumeration (CWE). In addition, we've extended the OWASP Top 10 2017, PCI DSS 3.2, and UL 2900 test configurations with new rules to help you achieve better compliance with the security standards. See the New and Updated Test Configurations section below. New Suppression FormatYou can now create suppressions for static analysis findings in parasoft.suppress files, which can be stored in source control along with your source files. You can create in-file suppressions in the dotTEST GUI or manually add information about findings you want to suppress to suppression files. See Suppressing Findings in the GUI and Suppressing the Reporting of Findings. The previous XML-style format used to create suppressions in the GUI is deprecated. You can convert deprecated suppressions to the new in-file format at IDE startup. See Migrating suppressions. Releasing Network License in the IDEYou can now optimize license token distribution by deactivating your network license when you are not actively using dotTEST in your IDE. This releases your license token so that it is available for another user. You can either manually deactivate your license or configure dotTEST to automatically release your license token when idle. See Setting the Parasoft License.
|
Rule ID | Header |
---|---|
PB.AIOAC | Avoid possible integer overflow in assignment and comparison expressions |
SEC.SDE | Avoid inclusion of sensitive data in exception |
SEC.RSAKS | Use RSA keys of 2048 bits or longer |
SEC.VLT | Validate shortcut target paths before use |
SEC.WEB.AXSSE | Enable anti-XSS protection in Web.config files |
SEC.WEB.CSP | Enable Content Security Policy in Web.config files |
SEC.WEB.UHCF | Avoid instantiating the HttpClient class by creating a HttpClient object |
We've updated the following rules:
The output messages of the following rules have been updated, and as a result, suppressions associated with these rules on DTP may no longer be available:
dotTEST no longer supports 32-bit operating systems.
Support for the following SCMs is removed:
Bug/FR ID | Description |
---|---|
DT-11202 | OPU.CPNEQ false positive |
DT-15542 | dotTEST cannot parse projects properly if they use variables defined at solution level |
DT-15789 | Drop oldest dependencies on C++ redistributable packages |
DT-15838 | dotTEST does not report all the violations on machine named with Chinese characters |
DT-16026 | Garbled Japanese output in dotTEST VSCode extension |
DT-16047 | dotTEST displays rule documents in English in VSCode using Japanese localization |
XT-37872 | Parasoft Findings Jenkins Plugin rule documentation unreadable due to incorrect formatting |
XT-38203 | Exception thrown when loading IDE license token |
For information about this release, see https://docs.parasoft.com/display/DOTTEST20202/Updates+in+2020.2. |