This error occurs when an empty string reaches a method that accepts passwords or a method which performs encryption.

Vulnerability and risk

An empty password is an easy way to attack the system.

Klocwork security vulnerability (SV) checkers identify calls that create potentially dangerous data; these calls are considered unsafe sources. An unsafe source can be any data provided by the user, since the user could be an attacker or has the potential for introducing human error.

Mitigation and prevention

Do not use empty passwords, especially hardcoded ones.

Example 1

     public static void main(String[] args) throws SQLException {
         Properties info = new Properties();
         info.setProperty("user", "root");
         info.setProperty("password", "");
         DriverManager.getConnection("jdbc:mysql://localhost:3307", info);

SV.PASSWD.HC.EMPTY is reported for line 16: empty string is used as a password: leaving an empty password in an application is a major security risk.

Security training

Application security training materials provided by Secure Code Warrior.


This checker can be extended through the Klocwork knowledge base. See Tuning Java analysis for more information.