{"id":1716,"date":"2012-06-06T13:10:00","date_gmt":"2012-06-06T20:10:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2012\/06\/06\/warnings-sdl-and-improving-uninitialized-variable-detection\/"},"modified":"2023-05-15T23:12:05","modified_gmt":"2023-05-16T06:12:05","slug":"warnings-sdl-and-improving-uninitialized-variable-detection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/06\/06\/warnings-sdl-and-improving-uninitialized-variable-detection\/","title":{"rendered":"Warnings, \/sdl, and improving uninitialized variable detection"},"content":{"rendered":"
Tim Burrell and Thomas Garnier of the TwC Security Science team present the sixth and last blog\u00a0installment describing more\u00a0\/sdl functionality in Visual Studio 2012 RC. Please note that there will be an MSDN webcast discussing the security\u00a0enhancements\u00a0to Visual Studio\u00a02012 RC\u00a0– a wrap-up of sorts –\u00a0on June 13 at 9:00AM (PST)<\/strong>.<\/span><\/p>\n ——————————————————————————————————————–<\/span><\/p>\n In <\/span>previous posts<\/span> \u00a0we introduced the \/sdl compiler switch and described its dual role of treating security-relevant warnings as errors to find bugs during development and enabling compiler mitigation features to help defend against residual bugs.<\/span><\/span><\/p>\n This post highlights how the \/sdl compiler switch makes prioritizing important security warnings easier and describes a new warning useful to identify potentially uninitialized pointers. <\/span><\/span><\/p>\n As noted in our overview post, \/sdl causes a number of compiler warnings to be treated as errors \u2013 Microsoft\u2019s SDL treats these warnings as mandatory for native code:<\/span><\/span><\/p>\n\/sdl and compiler warnings<\/span><\/span><\/span><\/h2>\n