This rule is a stub. It was generated by a tool that warned about using a resource after a method is invoked on the resource which invalidates it.

Noncompliant Code Example

This noncompliant code example shows an example where ...

 


Compliant Solution

In this compliant solution, ...

 

Risk Assessment

Leaking sensitive information outside a trust boundary is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

OBJ14-J

Medium

Likely

High

P6

L2

Related Guidelines

Bibliography

TODO