From 9c24c680a537dc83b235599ce4f26af854a8dbdd Mon Sep 17 00:00:00 2001
From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com>
Date: Wed, 15 Oct 2025 16:46:44 +0000
Subject: [PATCH 1/4] Initial plan
From 0150b61ff5f42f4dbd8402cad4599e38a9106d77 Mon Sep 17 00:00:00 2001
From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com>
Date: Wed, 15 Oct 2025 16:58:38 +0000
Subject: [PATCH 2/4] Add interactive rule configuration tool with JSON export
Co-authored-by: kfrancis <67574+kfrancis@users.noreply.github.com>
---
.github/workflows/pages.yml | 49 +
docs/README.md | 61 +
docs/config-tool/index.html | 658 +
docs/rules-metadata.json | 20462 +++++++++++++++++
tools/ConfigurationFilesGenerator/Program.cs | 97 +-
5 files changed, 21316 insertions(+), 11 deletions(-)
create mode 100644 .github/workflows/pages.yml
create mode 100644 docs/README.md
create mode 100644 docs/config-tool/index.html
create mode 100644 docs/rules-metadata.json
diff --git a/.github/workflows/pages.yml b/.github/workflows/pages.yml
new file mode 100644
index 0000000..1fec4b5
--- /dev/null
+++ b/.github/workflows/pages.yml
@@ -0,0 +1,49 @@
+name: Deploy GitHub Pages
+
+on:
+ push:
+ branches: ["main"]
+ workflow_dispatch:
+
+permissions:
+ contents: read
+ pages: write
+ id-token: write
+
+concurrency:
+ group: "pages"
+ cancel-in-progress: false
+
+jobs:
+ build:
+ runs-on: ubuntu-latest
+ steps:
+ - name: Checkout
+ uses: actions/checkout@v4
+
+ - name: Setup .NET
+ uses: actions/setup-dotnet@v4
+ with:
+ dotnet-version: '9.0.x'
+
+ - name: Generate rules metadata
+ run: dotnet run --project tools/ConfigurationFilesGenerator/ConfigurationFilesGenerator.csproj
+
+ - name: Setup Pages
+ uses: actions/configure-pages@v5
+
+ - name: Upload artifact
+ uses: actions/upload-pages-artifact@v3
+ with:
+ path: './docs'
+
+ deploy:
+ environment:
+ name: github-pages
+ url: ${{ steps.deployment.outputs.page_url }}
+ runs-on: ubuntu-latest
+ needs: build
+ steps:
+ - name: Deploy to GitHub Pages
+ id: deployment
+ uses: actions/deploy-pages@v4
diff --git a/docs/README.md b/docs/README.md
new file mode 100644
index 0000000..98269a0
--- /dev/null
+++ b/docs/README.md
@@ -0,0 +1,61 @@
+# CSS .NET Coding Standards - Documentation
+
+Welcome to the documentation for CSS .NET Coding Standards.
+
+## 🔧 Interactive Rule Configuration Tool
+
+Use our [Interactive Rule Configuration Tool](./config-tool/) to:
+
+- Browse all 500+ rules with descriptions and help links
+- Filter rules by category (Style, Quality, Security, Performance)
+- Search rules by ID, title, or description
+- Adjust severity levels interactively with live preview
+- Apply rule templates for different project types:
+ - **API Project** - Optimized for Web API projects
+ - **Library** - Optimized for class libraries
+ - **Blazor** - Optimized for Blazor applications
+ - **Test Project** - Relaxed rules for test projects
+- Export custom `.editorconfig` snippet to download
+
+### Getting Started
+
+1. Visit the [Configuration Tool](./config-tool/)
+2. Browse or search for rules you want to customize
+3. Adjust severity levels using the dropdown selectors
+4. Click "Export Configuration" to download your custom `.editorconfig`
+5. Add the downloaded configuration to your project's `.editorconfig` file
+
+### Rule Categories
+
+- **Style**: Code formatting and naming conventions
+- **Quality**: Code quality and maintainability rules
+- **Security**: Security-related analysis rules
+- **Performance**: Performance optimization rules
+- **Other**: Miscellaneous rules
+
+### Severity Levels
+
+- **none**: The rule is disabled
+- **silent**: The rule is enabled but doesn't produce any diagnostics
+- **suggestion**: Produces an IDE suggestion (green squiggle)
+- **warning**: Produces a warning (yellow squiggle)
+- **error**: Produces an error (red squiggle)
+
+## Rules Metadata
+
+The complete rules metadata is available in JSON format: [rules-metadata.json](./rules-metadata.json)
+
+This file contains:
+- Rule ID
+- Title
+- Description
+- Help URL
+- Category
+- Default severity
+- Package source
+
+## Learn More
+
+- [Main Repository](https://github.com/Clinical-Support-Systems/css-dotnet-codingstandards)
+- [NuGet Package](https://www.nuget.org/packages/CSS.DotNet.CodingStandards/)
+- [Microsoft .NET Code Analysis Documentation](https://learn.microsoft.com/en-us/dotnet/fundamentals/code-analysis/overview)
diff --git a/docs/config-tool/index.html b/docs/config-tool/index.html
new file mode 100644
index 0000000..839beed
--- /dev/null
+++ b/docs/config-tool/index.html
@@ -0,0 +1,658 @@
+
+
+
+
+
+ CSS .NET Coding Standards - Rule Configuration Tool
+
+
+
+
+
+
+
+
+
+
+
diff --git a/docs/rules-metadata.json b/docs/rules-metadata.json
new file mode 100644
index 0000000..7d6d6d7
--- /dev/null
+++ b/docs/rules-metadata.json
@@ -0,0 +1,20462 @@
+[
+ {
+ "id": "CA1000",
+ "title": "Do not declare static members on generic types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1000",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "When a static member of a generic type is called, the type argument must be specified for the type. When a generic instance member that does not support inference is called, the type argument must be specified for the member. In these two cases, the syntax for specifying the type argument is different and easily confused.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1000",
+ "title": "Do not declare static members on generic types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1000",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "When a static member of a generic type is called, the type argument must be specified for the type. When a generic instance member that does not support inference is called, the type argument must be specified for the member. In these two cases, the syntax for specifying the type argument is different and easily confused.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1001",
+ "title": "Types that own disposable fields should be disposable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1001",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A class declares and implements an instance field that is a System.IDisposable type, and the class does not implement IDisposable. A class that declares an IDisposable field indirectly owns an unmanaged resource and should implement the IDisposable interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1001",
+ "title": "Types that own disposable fields should be disposable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1001",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A class declares and implements an instance field that is a System.IDisposable type, and the class does not implement IDisposable. A class that declares an IDisposable field indirectly owns an unmanaged resource and should implement the IDisposable interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1002",
+ "title": "Do not expose generic lists",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "System.Collections.Generic.List\u003CT\u003E is a generic collection that\u0027s designed for performance and not inheritance. List\u003CT\u003E does not contain virtual members that make it easier to change the behavior of an inherited class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1002",
+ "title": "Do not expose generic lists",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "System.Collections.Generic.List\u003CT\u003E is a generic collection that\u0027s designed for performance and not inheritance. List\u003CT\u003E does not contain virtual members that make it easier to change the behavior of an inherited class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type contains a delegate that returns void, whose signature contains two parameters (the first an object and the second a type that is assignable to EventArgs), and the containing assembly targets Microsoft .NET Framework?2.0.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A delegate that handles a public or protected event does not have the correct signature, return type, or parameter names.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type contains an event that declares an EventHandler delegate that returns void, whose signature contains two parameters (the first an object and the second a type that is assignable to EventArgs), and the containing assembly targets Microsoft .NET Framework?2.0.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type contains a delegate that returns void, whose signature contains two parameters (the first an object and the second a type that is assignable to EventArgs), and the containing assembly targets Microsoft .NET Framework?2.0.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A delegate that handles a public or protected event does not have the correct signature, return type, or parameter names.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1003",
+ "title": "Use generic event handler instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type contains an event that declares an EventHandler delegate that returns void, whose signature contains two parameters (the first an object and the second a type that is assignable to EventArgs), and the containing assembly targets Microsoft .NET Framework?2.0.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1005",
+ "title": "Avoid excessive parameters on generic types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1005",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The more type parameters a generic type contains, the more difficult it is to know and remember what each type parameter represents.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1005",
+ "title": "Avoid excessive parameters on generic types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1005",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The more type parameters a generic type contains, the more difficult it is to know and remember what each type parameter represents.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1008",
+ "title": "Enums should have zero value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The default value of an uninitialized enumeration, just as other value types, is zero. A nonflags-attributed enumeration should define a member by using the value of zero so that the default value is a valid value of the enumeration. If an enumeration that has the FlagsAttribute attribute applied defines a zero-valued member, its name should be \u0022\u0022None\u0022\u0022 to indicate that no values have been set in the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1010",
+ "title": "Generic interface should also be implemented",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1010",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "To broaden the usability of a type, implement one of the generic interfaces. This is especially true for collections as they can then be used to populate generic collection types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1010",
+ "title": "Generic interface should also be implemented",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1010",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "To broaden the usability of a type, implement one of the generic interfaces. This is especially true for collections as they can then be used to populate generic collection types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1012",
+ "title": "Abstract types should not have public constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1012",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Constructors on abstract types can be called only by derived types. Because public constructors create instances of a type, and you cannot create instances of an abstract type, an abstract type that has a public constructor is incorrectly designed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1012",
+ "title": "Abstract types should not have public constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1012",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Constructors on abstract types can be called only by derived types. Because public constructors create instances of a type, and you cannot create instances of an abstract type, an abstract type that has a public constructor is incorrectly designed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1014",
+ "title": "Mark assemblies with CLSCompliant",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1014",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The Common Language Specification (CLS) defines naming restrictions, data types, and rules to which assemblies must conform if they will be used across programming languages. Good design dictates that all assemblies explicitly indicate CLS compliance by using CLSCompliantAttribute . If this attribute is not present on an assembly, the assembly is not compliant.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1014",
+ "title": "Mark assemblies with CLSCompliant",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1014",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The Common Language Specification (CLS) defines naming restrictions, data types, and rules to which assemblies must conform if they will be used across programming languages. Good design dictates that all assemblies explicitly indicate CLS compliance by using CLSCompliantAttribute . If this attribute is not present on an assembly, the assembly is not compliant.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1016",
+ "title": "Mark assemblies with assembly version",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1016",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The .NET Framework uses the version number to uniquely identify an assembly, and to bind to types in strongly named assemblies. The version number is used together with version and publisher policy. By default, applications run only with the assembly version with which they were built.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1016",
+ "title": "Mark assemblies with assembly version",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1016",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The .NET Framework uses the version number to uniquely identify an assembly, and to bind to types in strongly named assemblies. The version number is used together with version and publisher policy. By default, applications run only with the assembly version with which they were built.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1017",
+ "title": "Mark assemblies with ComVisible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "ComVisibleAttribute determines how COM clients access managed code. Good design dictates that assemblies explicitly indicate COM visibility. COM visibility can be set for the whole assembly and then overridden for individual types and type members. If this attribute is not present, the contents of the assembly are visible to COM clients.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1017",
+ "title": "Mark assemblies with ComVisible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "ComVisibleAttribute determines how COM clients access managed code. Good design dictates that assemblies explicitly indicate COM visibility. COM visibility can be set for the whole assembly and then overridden for individual types and type members. If this attribute is not present, the contents of the assembly are visible to COM clients.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1017",
+ "title": "Mark assemblies with ComVisible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "ComVisibleAttribute determines how COM clients access managed code. Good design dictates that assemblies explicitly indicate COM visibility. COM visibility can be set for the whole assembly and then overridden for individual types and type members. If this attribute is not present, the contents of the assembly are visible to COM clients.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1017",
+ "title": "Mark assemblies with ComVisible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "ComVisibleAttribute determines how COM clients access managed code. Good design dictates that assemblies explicitly indicate COM visibility. COM visibility can be set for the whole assembly and then overridden for individual types and type members. If this attribute is not present, the contents of the assembly are visible to COM clients.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1018",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1018",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1018",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1018",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1019",
+ "title": "Define accessors for attribute arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1019",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1021",
+ "title": "Avoid out parameters",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Passing types by reference (using \u0027out\u0027 or \u0027ref\u0027) requires experience with pointers, understanding how value types and reference types differ, and handling methods with multiple return values. Also, the difference between \u0027out\u0027 and \u0027ref\u0027 parameters is not widely understood.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1021",
+ "title": "Avoid out parameters",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Passing types by reference (using \u0027out\u0027 or \u0027ref\u0027) requires experience with pointers, understanding how value types and reference types differ, and handling methods with multiple return values. Also, the difference between \u0027out\u0027 and \u0027ref\u0027 parameters is not widely understood.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1024",
+ "title": "Use properties where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1024",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A public or protected method has a name that starts with \u0022\u0022Get\u0022\u0022, takes no parameters, and returns a value that is not an array. The method might be a good candidate to become a property.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1024",
+ "title": "Use properties where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1024",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A public or protected method has a name that starts with \u0022\u0022Get\u0022\u0022, takes no parameters, and returns a value that is not an array. The method might be a good candidate to become a property.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1027",
+ "title": "Mark enums with FlagsAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1027",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An enumeration is a value type that defines a set of related named constants. Apply FlagsAttribute to an enumeration when its named constants can be meaningfully combined.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1027",
+ "title": "Mark enums with FlagsAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1027",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An enumeration is a value type that defines a set of related named constants. Apply FlagsAttribute to an enumeration when its named constants can be meaningfully combined.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1028",
+ "title": "Enum Storage should be Int32",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1028",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An enumeration is a value type that defines a set of related named constants. By default, the System.Int32 data type is used to store the constant value. Although you can change this underlying type, it is not required or recommended for most scenarios.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1028",
+ "title": "Enum Storage should be Int32",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1028",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An enumeration is a value type that defines a set of related named constants. By default, the System.Int32 data type is used to store the constant value. Although you can change this underlying type, it is not required or recommended for most scenarios.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1030",
+ "title": "Use events where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1030",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule detects methods that have names that ordinarily would be used for events. If a method is called in response to a clearly defined state change, the method should be invoked by an event handler. Objects that call the method should raise events instead of calling the method directly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1030",
+ "title": "Use events where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1030",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule detects methods that have names that ordinarily would be used for events. If a method is called in response to a clearly defined state change, the method should be invoked by an event handler. Objects that call the method should raise events instead of calling the method directly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1031",
+ "title": "Do not catch general exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1031",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A general exception such as System.Exception or System.SystemException or a disallowed exception type is caught in a catch statement, or a general catch clause is used. General and disallowed exceptions should not be caught.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1031",
+ "title": "Do not catch general exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1031",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A general exception such as System.Exception or System.SystemException or a disallowed exception type is caught in a catch statement, or a general catch clause is used. General and disallowed exceptions should not be caught.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1032",
+ "title": "Implement standard exception constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1032",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Failure to provide the full set of constructors can make it difficult to correctly handle exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1032",
+ "title": "Implement standard exception constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1032",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Failure to provide the full set of constructors can make it difficult to correctly handle exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1033",
+ "title": "Interface methods should be callable by child types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1033",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An unsealed externally visible type provides an explicit method implementation of a public interface and does not provide an alternative externally visible method that has the same name.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1033",
+ "title": "Interface methods should be callable by child types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1033",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An unsealed externally visible type provides an explicit method implementation of a public interface and does not provide an alternative externally visible method that has the same name.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1034",
+ "title": "Nested types should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1034",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A nested type is a type that is declared in the scope of another type. Nested types are useful to encapsulate private implementation details of the containing type. Used for this purpose, nested types should not be externally visible.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1034",
+ "title": "Nested types should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1034",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A nested type is a type that is declared in the scope of another type. Nested types are useful to encapsulate private implementation details of the containing type. Used for this purpose, nested types should not be externally visible.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1034",
+ "title": "Nested types should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1034",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A nested type is a type that is declared in the scope of another type. Nested types are useful to encapsulate private implementation details of the containing type. Used for this purpose, nested types should not be externally visible.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1034",
+ "title": "Nested types should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1034",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A nested type is a type that is declared in the scope of another type. Nested types are useful to encapsulate private implementation details of the containing type. Used for this purpose, nested types should not be externally visible.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1036",
+ "title": "Override methods on comparable types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1036",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A public or protected type implements the System.IComparable interface. It does not override Object.Equals nor does it overload the language-specific operator for equality, inequality, less than, less than or equal, greater than or greater than or equal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1040",
+ "title": "Avoid empty interfaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1040",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Interfaces define members that provide a behavior or usage contract. The functionality that is described by the interface can be adopted by any type, regardless of where the type appears in the inheritance hierarchy. A type implements an interface by providing implementations for the members of the interface. An empty interface does not define any members; therefore, it does not define a contract that can be implemented.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1040",
+ "title": "Avoid empty interfaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1040",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Interfaces define members that provide a behavior or usage contract. The functionality that is described by the interface can be adopted by any type, regardless of where the type appears in the inheritance hierarchy. A type implements an interface by providing implementations for the members of the interface. An empty interface does not define any members; therefore, it does not define a contract that can be implemented.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1041",
+ "title": "Provide ObsoleteAttribute message",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1041",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A type or member is marked by using a System.ObsoleteAttribute attribute that does not have its ObsoleteAttribute.Message property specified. When a type or member that is marked by using ObsoleteAttribute is compiled, the Message property of the attribute is displayed. This gives the user information about the obsolete type or member.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1041",
+ "title": "Provide ObsoleteAttribute message",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1041",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A type or member is marked by using a System.ObsoleteAttribute attribute that does not have its ObsoleteAttribute.Message property specified. When a type or member that is marked by using ObsoleteAttribute is compiled, the Message property of the attribute is displayed. This gives the user information about the obsolete type or member.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1043",
+ "title": "Use Integral Or String Argument For Indexers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1043",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Indexers, that is, indexed properties, should use integer or string types for the index. These types are typically used for indexing data structures and increase the usability of the library. Use of the Object type should be restricted to those cases where the specific integer or string type cannot be specified at design time. If the design requires other types for the index, reconsider whether the type represents a logical data store. If it does not represent a logical data store, use a method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1043",
+ "title": "Use Integral Or String Argument For Indexers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1043",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Indexers, that is, indexed properties, should use integer or string types for the index. These types are typically used for indexing data structures and increase the usability of the library. Use of the Object type should be restricted to those cases where the specific integer or string type cannot be specified at design time. If the design requires other types for the index, reconsider whether the type represents a logical data store. If it does not represent a logical data store, use a method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1044",
+ "title": "Properties should not be write only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1044",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Although it is acceptable and often necessary to have a read-only property, the design guidelines prohibit the use of write-only properties. This is because letting a user set a value, and then preventing the user from viewing that value, does not provide any security. Also, without read access, the state of shared objects cannot be viewed, which limits their usefulness.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1044",
+ "title": "Properties should not be write only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1044",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Although it is acceptable and often necessary to have a read-only property, the design guidelines prohibit the use of write-only properties. This is because letting a user set a value, and then preventing the user from viewing that value, does not provide any security. Also, without read access, the state of shared objects cannot be viewed, which limits their usefulness.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1044",
+ "title": "Properties should not be write only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1044",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Although it is acceptable and often necessary to have a read-only property, the design guidelines prohibit the use of write-only properties. This is because letting a user set a value, and then preventing the user from viewing that value, does not provide any security. Also, without read access, the state of shared objects cannot be viewed, which limits their usefulness.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1044",
+ "title": "Properties should not be write only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1044",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Although it is acceptable and often necessary to have a read-only property, the design guidelines prohibit the use of write-only properties. This is because letting a user set a value, and then preventing the user from viewing that value, does not provide any security. Also, without read access, the state of shared objects cannot be viewed, which limits their usefulness.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1045",
+ "title": "Do not pass types by reference",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1045",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Passing types by reference (using out or ref) requires experience with pointers, understanding how value types and reference types differ, and handling methods that have multiple return values. Also, the difference between out and ref parameters is not widely understood.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1045",
+ "title": "Do not pass types by reference",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1045",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Passing types by reference (using out or ref) requires experience with pointers, understanding how value types and reference types differ, and handling methods that have multiple return values. Also, the difference between out and ref parameters is not widely understood.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1046",
+ "title": "Do not overload equality operator on reference types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1046",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For reference types, the default implementation of the equality operator is almost always correct. By default, two references are equal only if they point to the same object. If the operator is providing meaningful value equality, the type should implement the generic \u0027System.IEquatable\u0027 interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1046",
+ "title": "Do not overload equality operator on reference types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1046",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For reference types, the default implementation of the equality operator is almost always correct. By default, two references are equal only if they point to the same object. If the operator is providing meaningful value equality, the type should implement the generic \u0027System.IEquatable\u0027 interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1047",
+ "title": "Do not declare protected member in sealed type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1047",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Types declare protected members so that inheriting types can access or override the member. By definition, you cannot inherit from a sealed type, which means that protected methods on sealed types cannot be called.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1047",
+ "title": "Do not declare protected member in sealed type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1047",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Types declare protected members so that inheriting types can access or override the member. By definition, you cannot inherit from a sealed type, which means that protected methods on sealed types cannot be called.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1050",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1050",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Types are declared in namespaces to prevent name collisions and as a way to organize related types in an object hierarchy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1050",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1050",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Types are declared in namespaces to prevent name collisions and as a way to organize related types in an object hierarchy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1051",
+ "title": "Do not declare visible instance fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1051",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The primary use of a field should be as an implementation detail. Fields should be private or internal and should be exposed by using properties.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1051",
+ "title": "Do not declare visible instance fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1051",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The primary use of a field should be as an implementation detail. Fields should be private or internal and should be exposed by using properties.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1052",
+ "title": "Static holder types should be Static or NotInheritable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1052",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1052",
+ "title": "Static holder types should be Static or NotInheritable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1052",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1054",
+ "title": "URI-like parameters should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1054",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the parameter represents a Uniform Resource Identifier (URI). A string representation or a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. \u0027System.Uri\u0027 class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1054",
+ "title": "URI-like parameters should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1054",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the parameter represents a Uniform Resource Identifier (URI). A string representation or a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. \u0027System.Uri\u0027 class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1055",
+ "title": "URI-like return values should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1055",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the method returns a URI. A string representation of a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. The System.Uri class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1055",
+ "title": "URI-like return values should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1055",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the method returns a URI. A string representation of a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. The System.Uri class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1056",
+ "title": "URI-like properties should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1056",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the property represents a Uniform Resource Identifier (URI). A string representation of a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. The System.Uri class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1056",
+ "title": "URI-like properties should not be strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1056",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that the property represents a Uniform Resource Identifier (URI). A string representation of a URI is prone to parsing and encoding errors, and can lead to security vulnerabilities. The System.Uri class provides these services in a safe and secure manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1058",
+ "title": "Types should not extend certain base types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1058",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible type extends certain base types. Use one of the alternatives.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1058",
+ "title": "Types should not extend certain base types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1058",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible type extends certain base types. Use one of the alternatives.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1060",
+ "title": "Move pinvokes to native methods class",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1060",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Platform Invocation methods, such as those that are marked by using the System.Runtime.InteropServices.DllImportAttribute attribute, or methods that are defined by using the Declare keyword in Visual Basic, access unmanaged code. These methods should be of the NativeMethods, SafeNativeMethods, or UnsafeNativeMethods class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1060",
+ "title": "Move pinvokes to native methods class",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1060",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Platform Invocation methods, such as those that are marked by using the System.Runtime.InteropServices.DllImportAttribute attribute, or methods that are defined by using the Declare keyword in Visual Basic, access unmanaged code. These methods should be of the NativeMethods, SafeNativeMethods, or UnsafeNativeMethods class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1061",
+ "title": "Do not hide base class methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1061",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method in a base type is hidden by an identically named method in a derived type when the parameter signature of the derived method differs only by types that are more weakly derived than the corresponding types in the parameter signature of the base method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1061",
+ "title": "Do not hide base class methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1061",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method in a base type is hidden by an identically named method in a derived type when the parameter signature of the derived method differs only by types that are more weakly derived than the corresponding types in the parameter signature of the base method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1062",
+ "title": "Validate arguments of public methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1062",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible method dereferences one of its reference arguments without verifying whether that argument is \u0027null\u0027 (\u0027Nothing\u0027 in Visual Basic). All reference arguments that are passed to externally visible methods should be checked against \u0027null\u0027. If appropriate, throw an \u0027ArgumentNullException\u0027 when the argument is \u0027null\u0027. If the method is designed to be called only by known assemblies, you should make the method internal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1062",
+ "title": "Validate arguments of public methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1062",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible method dereferences one of its reference arguments without verifying whether that argument is \u0027null\u0027 (\u0027Nothing\u0027 in Visual Basic). All reference arguments that are passed to externally visible methods should be checked against \u0027null\u0027. If appropriate, throw an \u0027ArgumentNullException\u0027 when the argument is \u0027null\u0027. If the method is designed to be called only by known assemblies, you should make the method internal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1063",
+ "title": "Implement IDisposable Correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1063",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All IDisposable types should implement the Dispose pattern correctly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1064",
+ "title": "Exceptions should be public",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1064",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An internal exception is visible only inside its own internal scope. After the exception falls outside the internal scope, only the base exception can be used to catch the exception. If the internal exception is inherited from T:System.Exception, T:System.SystemException, or T:System.ApplicationException, the external code will not have sufficient information to know what to do with the exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1064",
+ "title": "Exceptions should be public",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1064",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An internal exception is visible only inside its own internal scope. After the exception falls outside the internal scope, only the base exception can be used to catch the exception. If the internal exception is inherited from T:System.Exception, T:System.SystemException, or T:System.ApplicationException, the external code will not have sufficient information to know what to do with the exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1065",
+ "title": "Do not raise exceptions in unexpected locations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1065",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method that is not expected to throw exceptions throws an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1066",
+ "title": "Implement IEquatable when overriding Object.Equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1066",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When a type T overrides Object.Equals(object), the implementation must cast the object argument to the correct type T before performing the comparison. If the type implements IEquatable\u003CT\u003E, and therefore offers the method T.Equals(T), and if the argument is known at compile time to be of type T, then the compiler can call IEquatable\u003CT\u003E.Equals(T) instead of Object.Equals(object), and no cast is necessary, improving performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1066",
+ "title": "Implement IEquatable when overriding Object.Equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1066",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When a type T overrides Object.Equals(object), the implementation must cast the object argument to the correct type T before performing the comparison. If the type implements IEquatable\u003CT\u003E, and therefore offers the method T.Equals(T), and if the argument is known at compile time to be of type T, then the compiler can call IEquatable\u003CT\u003E.Equals(T) instead of Object.Equals(object), and no cast is necessary, improving performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1067",
+ "title": "Override Object.Equals(object) when implementing IEquatable\u003CT\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1067",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "When a type T implements the interface IEquatable\u003CT\u003E, it suggests to a user who sees a call to the Equals method in source code that an instance of the type can be equated with an instance of any other type. The user might be confused if their attempt to equate the type with an instance of another type fails to compile. This violates the \u0022principle of least surprise\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1067",
+ "title": "Override Object.Equals(object) when implementing IEquatable\u003CT\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1067",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "When a type T implements the interface IEquatable\u003CT\u003E, it suggests to a user who sees a call to the Equals method in source code that an instance of the type can be equated with an instance of any other type. The user might be confused if their attempt to equate the type with an instance of another type fails to compile. This violates the \u0022principle of least surprise\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1068",
+ "title": "CancellationToken parameters must come last",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1068",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1068",
+ "title": "CancellationToken parameters must come last",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1068",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1069",
+ "title": "Enums values should not be duplicated",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1069",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1069",
+ "title": "Enums values should not be duplicated",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1069",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1069",
+ "title": "Enums values should not be duplicated",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1069",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1069",
+ "title": "Enums values should not be duplicated",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1069",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1070",
+ "title": "Do not declare event fields as virtual",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1070",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not declare virtual events in a base class. Overridden events in a derived class have undefined behavior. The C# compiler does not handle this correctly and it is unpredictable whether a subscriber to the derived event will actually be subscribing to the base class event.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1070",
+ "title": "Do not declare event fields as virtual",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1070",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not declare virtual events in a base class. Overridden events in a derived class have undefined behavior. The C# compiler does not handle this correctly and it is unpredictable whether a subscriber to the derived event will actually be subscribing to the base class event.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1200",
+ "title": "Avoid using cref tags with a prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1200",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Use of cref tags with prefixes should be avoided, since it prevents the compiler from verifying references and the IDE from updating references during refactorings. It is permissible to suppress this error at a single documentation site if the cref must use a prefix because the type being mentioned is not findable by the compiler. For example, if a cref is mentioning a special attribute in the full framework but you\u0027re in a file that compiles against the portable framework, or if you want to reference a type at higher layer of Roslyn, you should suppress the error. You should not suppress the error just because you want to take a shortcut and avoid using the full syntax.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1200",
+ "title": "Avoid using cref tags with a prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1200",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Use of cref tags with prefixes should be avoided, since it prevents the compiler from verifying references and the IDE from updating references during refactorings. It is permissible to suppress this error at a single documentation site if the cref must use a prefix because the type being mentioned is not findable by the compiler. For example, if a cref is mentioning a special attribute in the full framework but you\u0027re in a file that compiles against the portable framework, or if you want to reference a type at higher layer of Roslyn, you should suppress the error. You should not suppress the error just because you want to take a shortcut and avoid using the full syntax.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1303",
+ "title": "Do not pass literals as localized parameters",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1303",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method passes a string literal as a parameter to a constructor or method in the .NET Framework class library and that string should be localizable. To fix a violation of this rule, replace the string literal with a string retrieved through an instance of the ResourceManager class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1303",
+ "title": "Do not pass literals as localized parameters",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1303",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A method passes a string literal as a parameter to a constructor or method in the .NET Framework class library and that string should be localizable. To fix a violation of this rule, replace the string literal with a string retrieved through an instance of the ResourceManager class.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1304",
+ "title": "Specify CultureInfo",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1304",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls a member that has an overload that accepts a System.Globalization.CultureInfo parameter, and the method or constructor does not call the overload that takes the CultureInfo parameter. When a CultureInfo or System.IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027CultureInfo\u0027 parameter. Otherwise, if the result will be stored and accessed by software, such as when it is persisted to disk or to a database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1304",
+ "title": "Specify CultureInfo",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1304",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls a member that has an overload that accepts a System.Globalization.CultureInfo parameter, and the method or constructor does not call the overload that takes the CultureInfo parameter. When a CultureInfo or System.IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027CultureInfo\u0027 parameter. Otherwise, if the result will be stored and accessed by software, such as when it is persisted to disk or to a database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1305",
+ "title": "Specify IFormatProvider",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1305",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A method or constructor calls one or more members that have overloads that accept a System.IFormatProvider parameter, and the method or constructor does not call the overload that takes the IFormatProvider parameter. When a System.Globalization.CultureInfo or IFormatProvider object is not supplied, the default value that is supplied by the overloaded member might not have the effect that you want in all locales. If the result will be based on the input from/output displayed to the user, specify \u0027CultureInfo.CurrentCulture\u0027 as the \u0027IFormatProvider\u0027. Otherwise, if the result will be stored and accessed by software, such as when it is loaded from disk/database and when it is persisted to disk/database, specify \u0027CultureInfo.InvariantCulture\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1307",
+ "title": "Specify StringComparison for clarity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1307",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A string comparison operation uses a method overload that does not set a StringComparison parameter. It is recommended to use the overload with StringComparison parameter for clarity of intent. If the result will be displayed to the user, such as when sorting a list of items for display in a list box, specify \u0027StringComparison.CurrentCulture\u0027 or \u0027StringComparison.CurrentCultureIgnoreCase\u0027 as the \u0027StringComparison\u0027 parameter. If comparing case-insensitive identifiers, such as file paths, environment variables, or registry keys and values, specify \u0027StringComparison.OrdinalIgnoreCase\u0027. Otherwise, if comparing case-sensitive identifiers, specify \u0027StringComparison.Ordinal\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1307",
+ "title": "Specify StringComparison for clarity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1307",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A string comparison operation uses a method overload that does not set a StringComparison parameter. It is recommended to use the overload with StringComparison parameter for clarity of intent. If the result will be displayed to the user, such as when sorting a list of items for display in a list box, specify \u0027StringComparison.CurrentCulture\u0027 or \u0027StringComparison.CurrentCultureIgnoreCase\u0027 as the \u0027StringComparison\u0027 parameter. If comparing case-insensitive identifiers, such as file paths, environment variables, or registry keys and values, specify \u0027StringComparison.OrdinalIgnoreCase\u0027. Otherwise, if comparing case-sensitive identifiers, specify \u0027StringComparison.Ordinal\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1308",
+ "title": "Normalize strings to uppercase",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1308",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Strings should be normalized to uppercase. A small group of characters cannot make a round trip when they are converted to lowercase. To make a round trip means to convert the characters from one locale to another locale that represents character data differently, and then to accurately retrieve the original characters from the converted characters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1308",
+ "title": "Normalize strings to uppercase",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1308",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Strings should be normalized to uppercase. A small group of characters cannot make a round trip when they are converted to lowercase. To make a round trip means to convert the characters from one locale to another locale that represents character data differently, and then to accurately retrieve the original characters from the converted characters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1309",
+ "title": "Use ordinal string comparison",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1309",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A string comparison operation that is nonlinguistic does not set the StringComparison parameter to either Ordinal or OrdinalIgnoreCase. By explicitly setting the parameter to either StringComparison.Ordinal or StringComparison.OrdinalIgnoreCase, your code often gains speed, becomes more correct, and becomes more reliable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1309",
+ "title": "Use ordinal string comparison",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1309",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A string comparison operation that is nonlinguistic does not set the StringComparison parameter to either Ordinal or OrdinalIgnoreCase. By explicitly setting the parameter to either StringComparison.Ordinal or StringComparison.OrdinalIgnoreCase, your code often gains speed, becomes more correct, and becomes more reliable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1310",
+ "title": "Specify StringComparison for correctness",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1310",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A string comparison operation uses a method overload that does not set a StringComparison parameter, hence its behavior could vary based on the current user\u0027s locale settings. It is strongly recommended to use the overload with StringComparison parameter for correctness and clarity of intent. If the result will be displayed to the user, such as when sorting a list of items for display in a list box, specify \u0027StringComparison.CurrentCulture\u0027 or \u0027StringComparison.CurrentCultureIgnoreCase\u0027 as the \u0027StringComparison\u0027 parameter. If comparing case-insensitive identifiers, such as file paths, environment variables, or registry keys and values, specify \u0027StringComparison.OrdinalIgnoreCase\u0027. Otherwise, if comparing case-sensitive identifiers, specify \u0027StringComparison.Ordinal\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1310",
+ "title": "Specify StringComparison for correctness",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1310",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A string comparison operation uses a method overload that does not set a StringComparison parameter, hence its behavior could vary based on the current user\u0027s locale settings. It is strongly recommended to use the overload with StringComparison parameter for correctness and clarity of intent. If the result will be displayed to the user, such as when sorting a list of items for display in a list box, specify \u0027StringComparison.CurrentCulture\u0027 or \u0027StringComparison.CurrentCultureIgnoreCase\u0027 as the \u0027StringComparison\u0027 parameter. If comparing case-insensitive identifiers, such as file paths, environment variables, or registry keys and values, specify \u0027StringComparison.OrdinalIgnoreCase\u0027. Otherwise, if comparing case-sensitive identifiers, specify \u0027StringComparison.Ordinal\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1311",
+ "title": "Specify a culture or use an invariant version",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1311",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Specify culture to help avoid accidental implicit dependency on current culture. Using an invariant version yields consistent results regardless of the culture of an application.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1311",
+ "title": "Specify a culture or use an invariant version",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1311",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Specify culture to help avoid accidental implicit dependency on current culture. Using an invariant version yields consistent results regardless of the culture of an application.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1401",
+ "title": "P/Invokes should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1401",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A public or protected method in a public type has the System.Runtime.InteropServices.DllImportAttribute attribute (also implemented by the Declare keyword in Visual Basic). Such methods should not be exposed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1401",
+ "title": "P/Invokes should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1401",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A public or protected method in a public type has the System.Runtime.InteropServices.DllImportAttribute attribute (also implemented by the Declare keyword in Visual Basic). Such methods should not be exposed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1416",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1416",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1417",
+ "title": "Do not use \u0027OutAttribute\u0027 on string parameters for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1417",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "String parameters passed by value with the \u0027OutAttribute\u0027 can destabilize the runtime if the string is an interned string.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1417",
+ "title": "Do not use \u0027OutAttribute\u0027 on string parameters for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1417",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "String parameters passed by value with the \u0027OutAttribute\u0027 can destabilize the runtime if the string is an interned string.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1418",
+ "title": "Use valid platform string",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1418",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Platform compatibility analyzer requires a valid platform name and version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1419",
+ "title": "Provide a parameterless constructor that is as visible as the containing type for concrete types derived from \u0027System.Runtime.InteropServices.SafeHandle\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1419",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Providing a parameterless constructor that is as visible as the containing type for a type derived from \u0027System.Runtime.InteropServices.SafeHandle\u0027 enables better performance and usage with source-generated interop solutions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1419",
+ "title": "Provide a parameterless constructor that is as visible as the containing type for concrete types derived from \u0027System.Runtime.InteropServices.SafeHandle\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1419",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Providing a parameterless constructor that is as visible as the containing type for a type derived from \u0027System.Runtime.InteropServices.SafeHandle\u0027 enables better performance and usage with source-generated interop solutions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1420",
+ "title": "Property, type, or attribute requires runtime marshalling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1420",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using features that require runtime marshalling when runtime marshalling is disabled will result in runtime exceptions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1421",
+ "title": "This method uses runtime marshalling even when the \u0027DisableRuntimeMarshallingAttribute\u0027 is applied",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1421",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This method uses runtime marshalling even when runtime marshalling is disabled, which can cause unexpected behavior differences at runtime due to different expectations of a type\u0027s native layout.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1421",
+ "title": "This method uses runtime marshalling even when the \u0027DisableRuntimeMarshallingAttribute\u0027 is applied",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1421",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This method uses runtime marshalling even when runtime marshalling is disabled, which can cause unexpected behavior differences at runtime due to different expectations of a type\u0027s native layout.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1422",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1422",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1422",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1422",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1422",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1422",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1422",
+ "title": "Validate platform compatibility",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1422",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Using platform dependent API on a component makes the code no longer work across all platforms.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1501",
+ "title": "Avoid excessive inheritance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1501",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Deeply nested type hierarchies can be difficult to follow, understand, and maintain. This rule limits analysis to hierarchies in the same module. To fix a violation of this rule, derive the type from a base type that is less deep in the inheritance hierarchy or eliminate some of the intermediate base types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1501",
+ "title": "Avoid excessive inheritance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1501",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Deeply nested type hierarchies can be difficult to follow, understand, and maintain. This rule limits analysis to hierarchies in the same module. To fix a violation of this rule, derive the type from a base type that is less deep in the inheritance hierarchy or eliminate some of the intermediate base types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1502",
+ "title": "Avoid excessive complexity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1502",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Cyclomatic complexity measures the number of linearly independent paths through the method, which is determined by the number and complexity of conditional branches. A low cyclomatic complexity generally indicates a method that is easy to understand, test, and maintain. The cyclomatic complexity is calculated from a control flow graph of the method and is given as follows: \u0060cyclomatic complexity = the number of edges - the number of nodes \u002B 1\u0060, where a node represents a logic branch point and an edge represents a line between nodes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1502",
+ "title": "Avoid excessive complexity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1502",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Cyclomatic complexity measures the number of linearly independent paths through the method, which is determined by the number and complexity of conditional branches. A low cyclomatic complexity generally indicates a method that is easy to understand, test, and maintain. The cyclomatic complexity is calculated from a control flow graph of the method and is given as follows: \u0060cyclomatic complexity = the number of edges - the number of nodes \u002B 1\u0060, where a node represents a logic branch point and an edge represents a line between nodes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1505",
+ "title": "Avoid unmaintainable code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1505",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The maintainability index is calculated by using the following metrics: lines of code, program volume, and cyclomatic complexity. Program volume is a measure of the difficulty of understanding of a symbol that is based on the number of operators and operands in the code. Cyclomatic complexity is a measure of the structural complexity of the type or method. A low maintainability index indicates that code is probably difficult to maintain and would be a good candidate to redesign.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1505",
+ "title": "Avoid unmaintainable code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1505",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The maintainability index is calculated by using the following metrics: lines of code, program volume, and cyclomatic complexity. Program volume is a measure of the difficulty of understanding of a symbol that is based on the number of operators and operands in the code. Cyclomatic complexity is a measure of the structural complexity of the type or method. A low maintainability index indicates that code is probably difficult to maintain and would be a good candidate to redesign.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1506",
+ "title": "Avoid excessive class coupling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1506",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule measures class coupling by counting the number of unique type references that a symbol contains. Symbols that have a high degree of class coupling can be difficult to maintain. It is a good practice to have types and methods that exhibit low coupling and high cohesion. To fix this violation, try to redesign the code to reduce the number of types to which it is coupled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1506",
+ "title": "Avoid excessive class coupling",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1506",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule measures class coupling by counting the number of unique type references that a symbol contains. Symbols that have a high degree of class coupling can be difficult to maintain. It is a good practice to have types and methods that exhibit low coupling and high cohesion. To fix this violation, try to redesign the code to reduce the number of types to which it is coupled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1507",
+ "title": "Use nameof to express symbol names",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1507",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using nameof helps keep your code valid when refactoring.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1507",
+ "title": "Use nameof to express symbol names",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1507",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using nameof helps keep your code valid when refactoring.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1508",
+ "title": "Avoid dead conditional code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1508",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1508",
+ "title": "Avoid dead conditional code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1508",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1508",
+ "title": "Avoid dead conditional code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1508",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1508",
+ "title": "Avoid dead conditional code",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1508",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1509",
+ "title": "Invalid entry in code metrics rule specification file",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1509",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Invalid entry in code metrics rule specification file.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1509",
+ "title": "Invalid entry in code metrics rule specification file",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1509",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Invalid entry in code metrics rule specification file.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1510",
+ "title": "Use ArgumentNullException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1510",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1510",
+ "title": "Use ArgumentNullException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1510",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1511",
+ "title": "Use ArgumentException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1511",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1511",
+ "title": "Use ArgumentException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1511",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1512",
+ "title": "Use ArgumentOutOfRangeException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1512",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1512",
+ "title": "Use ArgumentOutOfRangeException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1512",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1513",
+ "title": "Use ObjectDisposedException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1513",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1513",
+ "title": "Use ObjectDisposedException throw helper",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1513",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Throw helpers are simpler and more efficient than an if block constructing a new exception instance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1514",
+ "title": "Avoid redundant length argument",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1514",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "An explicit length calculation can be error-prone and can be avoided when slicing to end of the buffer.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1514",
+ "title": "Avoid redundant length argument",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1514",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "An explicit length calculation can be error-prone and can be avoided when slicing to end of the buffer.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1515",
+ "title": "Consider making public types internal",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1515",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Unlike a class library, an application\u0027s API isn\u0027t typically referenced publicly, so types can be marked internal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1515",
+ "title": "Consider making public types internal",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1515",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Unlike a class library, an application\u0027s API isn\u0027t typically referenced publicly, so types can be marked internal.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1700",
+ "title": "Do not name enum values \u0027Reserved\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1700",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that an enumeration member that has a name that contains \u0022reserved\u0022 is not currently used but is a placeholder to be renamed or removed in a future version. Renaming or removing a member is a breaking change.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1700",
+ "title": "Do not name enum values \u0027Reserved\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1700",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "This rule assumes that an enumeration member that has a name that contains \u0022reserved\u0022 is not currently used but is a placeholder to be renamed or removed in a future version. Renaming or removing a member is a breaking change.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1707",
+ "title": "Identifiers should not contain underscores",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1707",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, identifier names do not contain the underscore (_) character. This rule checks namespaces, types, members, and parameters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1708",
+ "title": "Identifiers should differ by more than case",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1708",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Identifiers for namespaces, types, members, and parameters cannot differ only by case because languages that target the common language runtime are not required to be case-sensitive.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1708",
+ "title": "Identifiers should differ by more than case",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1708",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Identifiers for namespaces, types, members, and parameters cannot differ only by case because languages that target the common language runtime are not required to be case-sensitive.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1710",
+ "title": "Identifiers should have correct suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1710",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, have a suffix that is associated with the base type or interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1711",
+ "title": "Identifiers should not have incorrect suffix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1711",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "By convention, only the names of types that extend certain base types or that implement certain interfaces, or types that are derived from these types, should end with specific reserved suffixes. Other type names should not use these reserved suffixes.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1712",
+ "title": "Do not prefix enum values with type name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1712",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An enumeration\u0027s values should not start with the type name of the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1712",
+ "title": "Do not prefix enum values with type name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1712",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An enumeration\u0027s values should not start with the type name of the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1713",
+ "title": "Events should not have \u0027Before\u0027 or \u0027After\u0027 prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1713",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Event names should describe the action that raises the event. To name related events that are raised in a specific sequence, use the present or past tense to indicate the relative position in the sequence of actions. For example, when naming a pair of events that is raised when closing a resource, you might name it \u0027Closing\u0027 and \u0027Closed\u0027, instead of \u0027BeforeClose\u0027 and \u0027AfterClose\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1713",
+ "title": "Events should not have \u0027Before\u0027 or \u0027After\u0027 prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1713",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Event names should describe the action that raises the event. To name related events that are raised in a specific sequence, use the present or past tense to indicate the relative position in the sequence of actions. For example, when naming a pair of events that is raised when closing a resource, you might name it \u0027Closing\u0027 and \u0027Closed\u0027, instead of \u0027BeforeClose\u0027 and \u0027AfterClose\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1715",
+ "title": "Identifiers should have correct prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1715",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The name of an externally visible interface does not start with an uppercase \u0022\u0022I\u0022\u0022. The name of a generic type parameter on an externally visible type or method does not start with an uppercase \u0022\u0022T\u0022\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1715",
+ "title": "Identifiers should have correct prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1715",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The name of an externally visible interface does not start with an uppercase \u0022\u0022I\u0022\u0022. The name of a generic type parameter on an externally visible type or method does not start with an uppercase \u0022\u0022T\u0022\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1715",
+ "title": "Identifiers should have correct prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1715",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The name of an externally visible interface does not start with an uppercase \u0022\u0022I\u0022\u0022. The name of a generic type parameter on an externally visible type or method does not start with an uppercase \u0022\u0022T\u0022\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1715",
+ "title": "Identifiers should have correct prefix",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1715",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The name of an externally visible interface does not start with an uppercase \u0022\u0022I\u0022\u0022. The name of a generic type parameter on an externally visible type or method does not start with an uppercase \u0022\u0022T\u0022\u0022.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1716",
+ "title": "Identifiers should not match keywords",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1716",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A namespace name or a type name matches a reserved keyword in a programming language. Identifiers for namespaces and types should not match keywords that are defined by languages that target the common language runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1720",
+ "title": "Identifier contains type name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1720",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Names of parameters and members are better used to communicate their meaning than to describe their type, which is expected to be provided by development tools. For names of members, if a data type name must be used, use a language-independent name instead of a language-specific one.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1720",
+ "title": "Identifier contains type name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1720",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Names of parameters and members are better used to communicate their meaning than to describe their type, which is expected to be provided by development tools. For names of members, if a data type name must be used, use a language-independent name instead of a language-specific one.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1721",
+ "title": "Property names should not match get methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1721",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The name of a public or protected member starts with \u0022\u0022Get\u0022\u0022 and otherwise matches the name of a public or protected property. \u0022\u0022Get\u0022\u0022 methods and properties should have names that clearly distinguish their function.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1721",
+ "title": "Property names should not match get methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1721",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The name of a public or protected member starts with \u0022\u0022Get\u0022\u0022 and otherwise matches the name of a public or protected property. \u0022\u0022Get\u0022\u0022 methods and properties should have names that clearly distinguish their function.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1724",
+ "title": "Type names should not match namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1724",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Type names should not match the names of namespaces that are defined in the .NET Framework class library. Violating this rule can reduce the usability of the library.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1724",
+ "title": "Type names should not match namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1724",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Type names should not match the names of namespaces that are defined in the .NET Framework class library. Violating this rule can reduce the usability of the library.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1724",
+ "title": "Type names should not match namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1724",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Type names should not match the names of namespaces that are defined in the .NET Framework class library. Violating this rule can reduce the usability of the library.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1724",
+ "title": "Type names should not match namespaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1724",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Type names should not match the names of namespaces that are defined in the .NET Framework class library. Violating this rule can reduce the usability of the library.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1725",
+ "title": "Parameter names should match base declaration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1725",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Consistent naming of parameters in an override hierarchy increases the usability of the method overrides. A parameter name in a derived method that differs from the name in the base declaration can cause confusion about whether the method is an override of the base method or a new overload of the method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1725",
+ "title": "Parameter names should match base declaration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1725",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Consistent naming of parameters in an override hierarchy increases the usability of the method overrides. A parameter name in a derived method that differs from the name in the base declaration can cause confusion about whether the method is an override of the base method or a new overload of the method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1727",
+ "title": "Use PascalCase for named placeholders",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1727",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Use PascalCase for named placeholders in the logging message template.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1727",
+ "title": "Use PascalCase for named placeholders",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1727",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Use PascalCase for named placeholders in the logging message template.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1802",
+ "title": "Use literals where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1802",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A field is declared static and read-only (Shared and ReadOnly in Visual Basic), and is initialized by using a value that is computable at compile time. Because the value that is assigned to the targeted field is computable at compile time, change the declaration to a const (Const in Visual Basic) field so that the value is computed at compile time instead of at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1802",
+ "title": "Use literals where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1802",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A field is declared static and read-only (Shared and ReadOnly in Visual Basic), and is initialized by using a value that is computable at compile time. Because the value that is assigned to the targeted field is computable at compile time, change the declaration to a const (Const in Visual Basic) field so that the value is computed at compile time instead of at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1802",
+ "title": "Use literals where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1802",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A field is declared static and read-only (Shared and ReadOnly in Visual Basic), and is initialized by using a value that is computable at compile time. Because the value that is assigned to the targeted field is computable at compile time, change the declaration to a const (Const in Visual Basic) field so that the value is computed at compile time instead of at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1802",
+ "title": "Use literals where appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1802",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A field is declared static and read-only (Shared and ReadOnly in Visual Basic), and is initialized by using a value that is computable at compile time. Because the value that is assigned to the targeted field is computable at compile time, change the declaration to a const (Const in Visual Basic) field so that the value is computed at compile time instead of at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1805",
+ "title": "Do not initialize unnecessarily",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1805",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The .NET runtime initializes all fields of reference types to their default values before running the constructor. In most cases, explicitly initializing a field to its default value in a constructor is redundant, adding maintenance costs and potentially degrading performance (such as with increased assembly size), and the explicit initialization can be removed. In some cases, such as with static readonly fields that permanently retain their default value, consider instead changing them to be constants or properties.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1805",
+ "title": "Do not initialize unnecessarily",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1805",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "The .NET runtime initializes all fields of reference types to their default values before running the constructor. In most cases, explicitly initializing a field to its default value in a constructor is redundant, adding maintenance costs and potentially degrading performance (such as with increased assembly size), and the explicit initialization can be removed. In some cases, such as with static readonly fields that permanently retain their default value, consider instead changing them to be constants or properties.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1806",
+ "title": "Do not ignore method results",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1806",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A new object is created but never used; or a method that creates and returns a new string is called and the new string is never used; or a COM or P/Invoke method returns an HRESULT or error code that is never used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1810",
+ "title": "Initialize reference type static fields inline",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1810",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A reference type declares an explicit static constructor. To fix a violation of this rule, initialize all static data when it is declared and remove the static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1810",
+ "title": "Initialize reference type static fields inline",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1810",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A reference type declares an explicit static constructor. To fix a violation of this rule, initialize all static data when it is declared and remove the static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1812",
+ "title": "Avoid uninstantiated internal classes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1812",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An instance of an assembly-level type is not created by code in the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1812",
+ "title": "Avoid uninstantiated internal classes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1812",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An instance of an assembly-level type is not created by code in the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1813",
+ "title": "Avoid unsealed attributes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1813",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The .NET Framework class library provides methods for retrieving custom attributes. By default, these methods search the attribute inheritance hierarchy. Sealing the attribute eliminates the search through the inheritance hierarchy and can improve performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1813",
+ "title": "Avoid unsealed attributes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1813",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The .NET Framework class library provides methods for retrieving custom attributes. By default, these methods search the attribute inheritance hierarchy. Sealing the attribute eliminates the search through the inheritance hierarchy and can improve performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1814",
+ "title": "Prefer jagged arrays over multidimensional",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1814",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A jagged array is an array whose elements are arrays. The arrays that make up the elements can be of different sizes, leading to less wasted space for some sets of data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1815",
+ "title": "Override equals and operator equals on value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1815",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For value types, the inherited implementation of Equals uses the Reflection library and compares the contents of all fields. Reflection is computationally expensive, and comparing every field for equality might be unnecessary. If you expect users to compare or sort instances, or to use instances as hash table keys, your value type should implement Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1815",
+ "title": "Override equals and operator equals on value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1815",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For value types, the inherited implementation of Equals uses the Reflection library and compares the contents of all fields. Reflection is computationally expensive, and comparing every field for equality might be unnecessary. If you expect users to compare or sort instances, or to use instances as hash table keys, your value type should implement Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1815",
+ "title": "Override equals and operator equals on value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1815",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For value types, the inherited implementation of Equals uses the Reflection library and compares the contents of all fields. Reflection is computationally expensive, and comparing every field for equality might be unnecessary. If you expect users to compare or sort instances, or to use instances as hash table keys, your value type should implement Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1815",
+ "title": "Override equals and operator equals on value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1815",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "For value types, the inherited implementation of Equals uses the Reflection library and compares the contents of all fields. Reflection is computationally expensive, and comparing every field for equality might be unnecessary. If you expect users to compare or sort instances, or to use instances as hash table keys, your value type should implement Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1816",
+ "title": "Dispose methods should call SuppressFinalize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1816",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A method that is an implementation of Dispose does not call GC.SuppressFinalize; or a method that is not an implementation of Dispose calls GC.SuppressFinalize; or a method calls GC.SuppressFinalize and passes something other than this (Me in Visual Basic).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1819",
+ "title": "Properties should not return arrays",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1819",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Arrays that are returned by properties are not write-protected, even when the property is read-only. To keep the array tamper-proof, the property must return a copy of the array. Typically, users will not understand the adverse performance implications of calling such a property.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1819",
+ "title": "Properties should not return arrays",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1819",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Arrays that are returned by properties are not write-protected, even when the property is read-only. To keep the array tamper-proof, the property must return a copy of the array. Typically, users will not understand the adverse performance implications of calling such a property.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1820",
+ "title": "Test for empty strings using string length",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1820",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Comparing strings by using the String.Length property or the String.IsNullOrEmpty method is significantly faster than using Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1820",
+ "title": "Test for empty strings using string length",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1820",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Comparing strings by using the String.Length property or the String.IsNullOrEmpty method is significantly faster than using Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1821",
+ "title": "Remove empty Finalizers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1821",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Finalizers should be avoided where possible, to avoid the additional performance overhead involved in tracking object lifetime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1821",
+ "title": "Remove empty Finalizers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1821",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Finalizers should be avoided where possible, to avoid the additional performance overhead involved in tracking object lifetime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1822",
+ "title": "Mark members as static",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1822",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Members that do not access instance data or call instance methods can be marked as static. After you mark the methods as static, the compiler will emit nonvirtual call sites to these members. This can give you a measurable performance gain for performance-sensitive code.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1822",
+ "title": "Mark members as static",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1822",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Members that do not access instance data or call instance methods can be marked as static. After you mark the methods as static, the compiler will emit nonvirtual call sites to these members. This can give you a measurable performance gain for performance-sensitive code.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1823",
+ "title": "Avoid unused private fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1823",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Private fields were detected that do not appear to be accessed in the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1823",
+ "title": "Avoid unused private fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1823",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Private fields were detected that do not appear to be accessed in the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1824",
+ "title": "Mark assemblies with NeutralResourcesLanguageAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1824",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The NeutralResourcesLanguage attribute informs the ResourceManager of the language that was used to display the resources of a neutral culture for an assembly. This improves lookup performance for the first resource that you load and can reduce your working set.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1824",
+ "title": "Mark assemblies with NeutralResourcesLanguageAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1824",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The NeutralResourcesLanguage attribute informs the ResourceManager of the language that was used to display the resources of a neutral culture for an assembly. This improves lookup performance for the first resource that you load and can reduce your working set.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1825",
+ "title": "Avoid zero-length array allocations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1825",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1825",
+ "title": "Avoid zero-length array allocations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1825",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1826",
+ "title": "Do not use Enumerable methods on indexable collections",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1826",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This collection is directly indexable. Going through LINQ here causes unnecessary allocations and CPU work.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1826",
+ "title": "Do not use Enumerable methods on indexable collections",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1826",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This collection is directly indexable. Going through LINQ here causes unnecessary allocations and CPU work.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1827",
+ "title": "Do not use Count() or LongCount() when Any() can be used",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1827",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For non-empty collections, Count() and LongCount() enumerate the entire sequence, while Any() stops at the first item or the first item that satisfies a condition.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1827",
+ "title": "Do not use Count() or LongCount() when Any() can be used",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1827",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For non-empty collections, Count() and LongCount() enumerate the entire sequence, while Any() stops at the first item or the first item that satisfies a condition.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1828",
+ "title": "Do not use CountAsync() or LongCountAsync() when AnyAsync() can be used",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1828",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For non-empty collections, CountAsync() and LongCountAsync() enumerate the entire sequence, while AnyAsync() stops at the first item or the first item that satisfies a condition.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1828",
+ "title": "Do not use CountAsync() or LongCountAsync() when AnyAsync() can be used",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1828",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For non-empty collections, CountAsync() and LongCountAsync() enumerate the entire sequence, while AnyAsync() stops at the first item or the first item that satisfies a condition.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1829",
+ "title": "Use Length/Count property instead of Count() when available",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1829",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Count() potentially enumerates the sequence while a Length/Count property is a direct access.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1829",
+ "title": "Use Length/Count property instead of Count() when available",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1829",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Count() potentially enumerates the sequence while a Length/Count property is a direct access.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1830",
+ "title": "Prefer strongly-typed Append and Insert method overloads on StringBuilder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1830",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "StringBuilder.Append and StringBuilder.Insert provide overloads for multiple types beyond System.String. When possible, prefer the strongly-typed overloads over using ToString() and the string-based overload.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1830",
+ "title": "Prefer strongly-typed Append and Insert method overloads on StringBuilder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1830",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "StringBuilder.Append and StringBuilder.Insert provide overloads for multiple types beyond System.String. When possible, prefer the strongly-typed overloads over using ToString() and the string-based overload.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1831",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1831",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on string values produces a copy of requested portion of the string. This copy is usually unnecessary when it is implicitly used as a ReadOnlySpan or ReadOnlyMemory value. Use the AsSpan method to avoid the unnecessary copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1831",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1831",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on string values produces a copy of requested portion of the string. This copy is usually unnecessary when it is implicitly used as a ReadOnlySpan or ReadOnlyMemory value. Use the AsSpan method to avoid the unnecessary copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1832",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1832",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on array values produces a copy of requested portion of the array. This copy is usually unnecessary when it is implicitly used as a ReadOnlySpan or ReadOnlyMemory value. Use the AsSpan method to avoid the unnecessary copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1832",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1832",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on array values produces a copy of requested portion of the array. This copy is usually unnecessary when it is implicitly used as a ReadOnlySpan or ReadOnlyMemory value. Use the AsSpan method to avoid the unnecessary copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1833",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1833",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on array values produces a copy of requested portion of the array. This copy is often unwanted when it is implicitly used as a Span or Memory value. Use the AsSpan method to avoid the copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1833",
+ "title": "Use AsSpan or AsMemory instead of Range-based indexers when appropriate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1833",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The Range-based indexer on array values produces a copy of requested portion of the array. This copy is often unwanted when it is implicitly used as a Span or Memory value. Use the AsSpan method to avoid the copy.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1834",
+ "title": "Consider using \u0027StringBuilder.Append(char)\u0027 when applicable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1834",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027StringBuilder.Append(char)\u0027 is more efficient than \u0027StringBuilder.Append(string)\u0027 when the string is a single character. When calling \u0027Append\u0027 with a constant, prefer using a constant char rather than a constant string containing one character.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1834",
+ "title": "Consider using \u0027StringBuilder.Append(char)\u0027 when applicable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1834",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027StringBuilder.Append(char)\u0027 is more efficient than \u0027StringBuilder.Append(string)\u0027 when the string is a single character. When calling \u0027Append\u0027 with a constant, prefer using a constant char rather than a constant string containing one character.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1835",
+ "title": "Prefer the \u0027Memory\u0027-based overloads for \u0027ReadAsync\u0027 and \u0027WriteAsync\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1835",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Stream\u0027 has a \u0027ReadAsync\u0027 overload that takes a \u0027Memory\u003CByte\u003E\u0027 as the first argument, and a \u0027WriteAsync\u0027 overload that takes a \u0027ReadOnlyMemory\u003CByte\u003E\u0027 as the first argument. Prefer calling the memory based overloads, which are more efficient.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1835",
+ "title": "Prefer the \u0027Memory\u0027-based overloads for \u0027ReadAsync\u0027 and \u0027WriteAsync\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1835",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Stream\u0027 has a \u0027ReadAsync\u0027 overload that takes a \u0027Memory\u003CByte\u003E\u0027 as the first argument, and a \u0027WriteAsync\u0027 overload that takes a \u0027ReadOnlyMemory\u003CByte\u003E\u0027 as the first argument. Prefer calling the memory based overloads, which are more efficient.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1835",
+ "title": "Prefer the \u0027Memory\u0027-based overloads for \u0027ReadAsync\u0027 and \u0027WriteAsync\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1835",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Stream\u0027 has a \u0027ReadAsync\u0027 overload that takes a \u0027Memory\u003CByte\u003E\u0027 as the first argument, and a \u0027WriteAsync\u0027 overload that takes a \u0027ReadOnlyMemory\u003CByte\u003E\u0027 as the first argument. Prefer calling the memory based overloads, which are more efficient.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1835",
+ "title": "Prefer the \u0027Memory\u0027-based overloads for \u0027ReadAsync\u0027 and \u0027WriteAsync\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1835",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Stream\u0027 has a \u0027ReadAsync\u0027 overload that takes a \u0027Memory\u003CByte\u003E\u0027 as the first argument, and a \u0027WriteAsync\u0027 overload that takes a \u0027ReadOnlyMemory\u003CByte\u003E\u0027 as the first argument. Prefer calling the memory based overloads, which are more efficient.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1836",
+ "title": "Prefer IsEmpty over Count",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1836",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For determining whether the object contains or not any items, prefer using \u0027IsEmpty\u0027 property rather than retrieving the number of items from the \u0027Count\u0027 property and comparing it to 0 or 1.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1836",
+ "title": "Prefer IsEmpty over Count",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1836",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "For determining whether the object contains or not any items, prefer using \u0027IsEmpty\u0027 property rather than retrieving the number of items from the \u0027Count\u0027 property and comparing it to 0 or 1.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1837",
+ "title": "Use \u0027Environment.ProcessId\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1837",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.ProcessId\u0027 is simpler and faster than \u0027Process.GetCurrentProcess().Id\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1837",
+ "title": "Use \u0027Environment.ProcessId\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1837",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.ProcessId\u0027 is simpler and faster than \u0027Process.GetCurrentProcess().Id\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1838",
+ "title": "Avoid \u0027StringBuilder\u0027 parameters for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1838",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Marshalling of \u0027StringBuilder\u0027 always creates a native buffer copy, resulting in multiple allocations for one marshalling operation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1838",
+ "title": "Avoid \u0027StringBuilder\u0027 parameters for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1838",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Marshalling of \u0027StringBuilder\u0027 always creates a native buffer copy, resulting in multiple allocations for one marshalling operation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1839",
+ "title": "Use \u0027Environment.ProcessPath\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1839",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.ProcessPath\u0027 is simpler and faster than \u0027Process.GetCurrentProcess().MainModule.FileName\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1839",
+ "title": "Use \u0027Environment.ProcessPath\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1839",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.ProcessPath\u0027 is simpler and faster than \u0027Process.GetCurrentProcess().MainModule.FileName\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1840",
+ "title": "Use \u0027Environment.CurrentManagedThreadId\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1840",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.CurrentManagedThreadId\u0027 is simpler and faster than \u0027Thread.CurrentThread.ManagedThreadId\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1840",
+ "title": "Use \u0027Environment.CurrentManagedThreadId\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1840",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Environment.CurrentManagedThreadId\u0027 is simpler and faster than \u0027Thread.CurrentThread.ManagedThreadId\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1841",
+ "title": "Prefer Dictionary.Contains methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1841",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ContainsKey\u0027 is usually O(1), while \u0027Keys.Contains\u0027 may be O(n) in some cases. Additionally, many dictionary implementations lazily initialize the Keys collection to cut back on allocations.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1841",
+ "title": "Prefer Dictionary.Contains methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1841",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Many dictionary implementations lazily initialize the Values collection. To avoid unnecessary allocations, prefer \u0027ContainsValue\u0027 over \u0027Values.Contains\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1841",
+ "title": "Prefer Dictionary.Contains methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1841",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ContainsKey\u0027 is usually O(1), while \u0027Keys.Contains\u0027 may be O(n) in some cases. Additionally, many dictionary implementations lazily initialize the Keys collection to cut back on allocations.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1841",
+ "title": "Prefer Dictionary.Contains methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1841",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Many dictionary implementations lazily initialize the Values collection. To avoid unnecessary allocations, prefer \u0027ContainsValue\u0027 over \u0027Values.Contains\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1842",
+ "title": "Do not use \u0027WhenAll\u0027 with a single task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1842",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using \u0027WhenAll\u0027 with a single task may result in performance loss, await or return the task instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1842",
+ "title": "Do not use \u0027WhenAll\u0027 with a single task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1842",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using \u0027WhenAll\u0027 with a single task may result in performance loss, await or return the task instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1843",
+ "title": "Do not use \u0027WaitAll\u0027 with a single task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1843",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using \u0027WaitAll\u0027 with a single task may result in performance loss, await or return the task instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1843",
+ "title": "Do not use \u0027WaitAll\u0027 with a single task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1843",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using \u0027WaitAll\u0027 with a single task may result in performance loss, await or return the task instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1844",
+ "title": "Provide memory-based overrides of async methods when subclassing \u0027Stream\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1844",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "To improve performance, override the memory-based async methods when subclassing \u0027Stream\u0027. Then implement the array-based methods in terms of the memory-based methods.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1844",
+ "title": "Provide memory-based overrides of async methods when subclassing \u0027Stream\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1844",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "To improve performance, override the memory-based async methods when subclassing \u0027Stream\u0027. Then implement the array-based methods in terms of the memory-based methods.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1845",
+ "title": "Use span-based \u0027string.Concat\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1845",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is more efficient to use \u0027AsSpan\u0027 and \u0027string.Concat\u0027, instead of \u0027Substring\u0027 and a concatenation operator.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1845",
+ "title": "Use span-based \u0027string.Concat\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1845",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is more efficient to use \u0027AsSpan\u0027 and \u0027string.Concat\u0027, instead of \u0027Substring\u0027 and a concatenation operator.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1846",
+ "title": "Prefer \u0027AsSpan\u0027 over \u0027Substring\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1846",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027AsSpan\u0027 is more efficient than \u0027Substring\u0027. \u0027Substring\u0027 performs an O(n) string copy, while \u0027AsSpan\u0027 does not and has a constant cost.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1846",
+ "title": "Prefer \u0027AsSpan\u0027 over \u0027Substring\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1846",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027AsSpan\u0027 is more efficient than \u0027Substring\u0027. \u0027Substring\u0027 performs an O(n) string copy, while \u0027AsSpan\u0027 does not and has a constant cost.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1847",
+ "title": "Use char literal for a single character lookup",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1847",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027string.Contains(char)\u0027 is available as a better performing overload for single char lookup.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1847",
+ "title": "Use char literal for a single character lookup",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1847",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027string.Contains(char)\u0027 is available as a better performing overload for single char lookup.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1848",
+ "title": "Use the LoggerMessage delegates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1848",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "For improved performance, use the LoggerMessage delegates.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1848",
+ "title": "Use the LoggerMessage delegates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1848",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "For improved performance, use the LoggerMessage delegates.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1849",
+ "title": "Call async methods when in an async method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1849",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When inside a Task-returning method, use the async version of methods, if they exist.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1849",
+ "title": "Call async methods when in an async method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1849",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When inside a Task-returning method, use the async version of methods, if they exist.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1849",
+ "title": "Call async methods when in an async method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1849",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When inside a Task-returning method, use the async version of methods, if they exist.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1849",
+ "title": "Call async methods when in an async method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1849",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When inside a Task-returning method, use the async version of methods, if they exist.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1850",
+ "title": "Prefer static \u0027HashData\u0027 method over \u0027ComputeHash\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1850",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is more efficient to use the static \u0027HashData\u0027 method over creating and managing a HashAlgorithm instance to call \u0027ComputeHash\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1850",
+ "title": "Prefer static \u0027HashData\u0027 method over \u0027ComputeHash\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1850",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is more efficient to use the static \u0027HashData\u0027 method over creating and managing a HashAlgorithm instance to call \u0027ComputeHash\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1851",
+ "title": "Possible multiple enumerations of \u0027IEnumerable\u0027 collection",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1851",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1851",
+ "title": "Possible multiple enumerations of \u0027IEnumerable\u0027 collection",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1851",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1852",
+ "title": "Seal internal types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1852",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "When a type is not accessible outside its assembly and has no subtypes within its containing assembly, it can be safely sealed. Sealing types can improve performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1852",
+ "title": "Seal internal types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1852",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "When a type is not accessible outside its assembly and has no subtypes within its containing assembly, it can be safely sealed. Sealing types can improve performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1853",
+ "title": "Unnecessary call to \u0027Dictionary.ContainsKey(key)\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1853",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not guard \u0027Dictionary.Remove(key)\u0027 with \u0027Dictionary.ContainsKey(key)\u0027. The former already checks whether the key exists, and will not throw if it does not.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1853",
+ "title": "Unnecessary call to \u0027Dictionary.ContainsKey(key)\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1853",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not guard \u0027Dictionary.Remove(key)\u0027 with \u0027Dictionary.ContainsKey(key)\u0027. The former already checks whether the key exists, and will not throw if it does not.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1854",
+ "title": "Prefer the \u0027IDictionary.TryGetValue(TKey, out TValue)\u0027 method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1854",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer a \u0027TryGetValue\u0027 call over a Dictionary indexer access guarded by a \u0027ContainsKey\u0027 check. \u0027ContainsKey\u0027 and the indexer both would lookup the key under the hood, so using \u0027TryGetValue\u0027 removes the extra lookup.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1854",
+ "title": "Prefer the \u0027IDictionary.TryGetValue(TKey, out TValue)\u0027 method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1854",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer a \u0027TryGetValue\u0027 call over a Dictionary indexer access guarded by a \u0027ContainsKey\u0027 check. \u0027ContainsKey\u0027 and the indexer both would lookup the key under the hood, so using \u0027TryGetValue\u0027 removes the extra lookup.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1855",
+ "title": "Prefer \u0027Clear\u0027 over \u0027Fill\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1855",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is more efficient to use \u0027Clear\u0027, instead of \u0027Fill\u0027 with default value.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1856",
+ "title": "Incorrect usage of ConstantExpected attribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1856",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "ConstantExpected attribute is not applied correctly on the parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1856",
+ "title": "Incorrect usage of ConstantExpected attribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1856",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "ConstantExpected attribute is not applied correctly on the parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1856",
+ "title": "Incorrect usage of ConstantExpected attribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1856",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "ConstantExpected attribute is not applied correctly on the parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1856",
+ "title": "Incorrect usage of ConstantExpected attribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1856",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "ConstantExpected attribute is not applied correctly on the parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1857",
+ "title": "A constant is expected for the parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1857",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameter expects a constant for optimal performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1857",
+ "title": "A constant is expected for the parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1857",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameter expects a constant for optimal performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1857",
+ "title": "A constant is expected for the parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1857",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameter expects a constant for optimal performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1857",
+ "title": "A constant is expected for the parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1857",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameter expects a constant for optimal performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1858",
+ "title": "Use \u0027StartsWith\u0027 instead of \u0027IndexOf\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1858",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is both clearer and faster to use \u0027StartsWith\u0027 instead of comparing the result of \u0027IndexOf\u0027 to zero.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1858",
+ "title": "Use \u0027StartsWith\u0027 instead of \u0027IndexOf\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1858",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "It is both clearer and faster to use \u0027StartsWith\u0027 instead of comparing the result of \u0027IndexOf\u0027 to zero.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1859",
+ "title": "Use concrete types when possible for improved performance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1859",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using concrete types avoids virtual or interface call overhead and enables inlining.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1860",
+ "title": "Avoid using \u0027Enumerable.Any()\u0027 extension method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1860",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer using \u0027IsEmpty\u0027, \u0027Count\u0027 or \u0027Length\u0027 properties whichever available, rather than calling \u0027Enumerable.Any()\u0027. The intent is clearer and it is more performant than using \u0027Enumerable.Any()\u0027 extension method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1861",
+ "title": "Avoid constant arrays as arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1861",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Constant arrays passed as arguments are not reused when called repeatedly, which implies a new array is created each time. Consider extracting them to \u0027static readonly\u0027 fields to improve performance if the passed array is not mutated within the called method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1861",
+ "title": "Avoid constant arrays as arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1861",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Constant arrays passed as arguments are not reused when called repeatedly, which implies a new array is created each time. Consider extracting them to \u0027static readonly\u0027 fields to improve performance if the passed array is not mutated within the called method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons because they lead to an allocation. Instead, prefer calling the method overloads of \u0027Contains\u0027, \u0027IndexOf\u0027 and \u0027StartsWith\u0027 that take a \u0027StringComparison\u0027 enum value to perform case-insensitive comparisons. Switching to using an overload that takes a \u0027StringComparison\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparison.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons when using \u0027CompareTo\u0027, because they lead to an allocation. Instead, use \u0027StringComparer\u0027 to perform case-insensitive comparisons. Switching to using \u0027StringComparer\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparer.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons, as in \u0027string.ToLower() == string.ToLower()\u0027, because they lead to an allocation. Instead, use \u0027string.Equals(string, StringComparison)\u0027 to perform case-insensitive comparisons. Switching to using an overload that takes a \u0027StringComparison\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparison.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons because they lead to an allocation. Instead, prefer calling the method overloads of \u0027Contains\u0027, \u0027IndexOf\u0027 and \u0027StartsWith\u0027 that take a \u0027StringComparison\u0027 enum value to perform case-insensitive comparisons. Switching to using an overload that takes a \u0027StringComparison\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparison.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons when using \u0027CompareTo\u0027, because they lead to an allocation. Instead, use \u0027StringComparer\u0027 to perform case-insensitive comparisons. Switching to using \u0027StringComparer\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparer.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1862",
+ "title": "Use the \u0027StringComparison\u0027 method overloads to perform case-insensitive string comparisons",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1862",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid calling \u0027ToLower\u0027, \u0027ToUpper\u0027, \u0027ToLowerInvariant\u0027 and \u0027ToUpperInvariant\u0027 to perform case-insensitive string comparisons, as in \u0027string.ToLower() == string.ToLower()\u0027, because they lead to an allocation. Instead, use \u0027string.Equals(string, StringComparison)\u0027 to perform case-insensitive comparisons. Switching to using an overload that takes a \u0027StringComparison\u0027 might cause subtle changes in behavior, so it\u0027s important to conduct thorough testing after applying the suggestion. Additionally, if a culturally sensitive comparison is not required, consider using \u0027StringComparison.OrdinalIgnoreCase\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1863",
+ "title": "Use \u0027CompositeFormat\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1863",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Cache and use a \u0027CompositeFormat\u0027 instance as the argument to this formatting operation, rather than passing in the original format string. This reduces the cost of the formatting operation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1863",
+ "title": "Use \u0027CompositeFormat\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1863",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Cache and use a \u0027CompositeFormat\u0027 instance as the argument to this formatting operation, rather than passing in the original format string. This reduces the cost of the formatting operation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1864",
+ "title": "Prefer the \u0027IDictionary.TryAdd(TKey, TValue)\u0027 method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1864",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer a \u0027TryAdd\u0027 call over an \u0027Add\u0027 call guarded by a \u0027ContainsKey\u0027 check. \u0027TryAdd\u0027 behaves the same as \u0027Add\u0027, except that when the specified key already exists, it returns \u0027false\u0027 instead of throwing an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1864",
+ "title": "Prefer the \u0027IDictionary.TryAdd(TKey, TValue)\u0027 method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1864",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Prefer a \u0027TryAdd\u0027 call over an \u0027Add\u0027 call guarded by a \u0027ContainsKey\u0027 check. \u0027TryAdd\u0027 behaves the same as \u0027Add\u0027, except that when the specified key already exists, it returns \u0027false\u0027 instead of throwing an exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1865",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1865",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1865",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1865",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1866",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1866",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1866",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1866",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1867",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1867",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1867",
+ "title": "Use char overload",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1867",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The char overload is a better performing overload than a string with a single char.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1868",
+ "title": "Unnecessary call to \u0027Contains(item)\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1868",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not guard \u0027Add(item)\u0027 or \u0027Remove(item)\u0027 with \u0027Contains(item)\u0027 for the set. The former two already check whether the item exists and will return if it was added or removed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1868",
+ "title": "Unnecessary call to \u0027Contains(item)\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1868",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Do not guard \u0027Add(item)\u0027 or \u0027Remove(item)\u0027 with \u0027Contains(item)\u0027 for the set. The former two already check whether the item exists and will return if it was added or removed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1869",
+ "title": "Cache and reuse \u0027JsonSerializerOptions\u0027 instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1869",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid creating a new \u0027JsonSerializerOptions\u0027 instance for every serialization operation. Cache and reuse instances instead. Single use \u0027JsonSerializerOptions\u0027 instances can substantially degrade the performance of your application.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1869",
+ "title": "Cache and reuse \u0027JsonSerializerOptions\u0027 instances",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1869",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Avoid creating a new \u0027JsonSerializerOptions\u0027 instance for every serialization operation. Cache and reuse instances instead. Single use \u0027JsonSerializerOptions\u0027 instances can substantially degrade the performance of your application.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1870",
+ "title": "Use a cached \u0027SearchValues\u0027 instance",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1870",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using a cached \u0027SearchValues\u0027 instance is more efficient than passing values to \u0027IndexOfAny\u0027/\u0027ContainsAny\u0027 directly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1871",
+ "title": "Do not pass a nullable struct to \u0027ArgumentNullException.ThrowIfNull\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1871",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ArgumentNullException.ThrowIfNull\u0027 accepts an \u0027object\u0027, so passing a nullable struct may cause the value to be boxed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1871",
+ "title": "Do not pass a nullable struct to \u0027ArgumentNullException.ThrowIfNull\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1871",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ArgumentNullException.ThrowIfNull\u0027 accepts an \u0027object\u0027, so passing a nullable struct may cause the value to be boxed.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1872",
+ "title": "Prefer \u0027Convert.ToHexString\u0027 and \u0027Convert.ToHexStringLower\u0027 over call chains based on \u0027BitConverter.ToString\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1872",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Use \u0027Convert.ToHexString\u0027 or \u0027Convert.ToHexStringLower\u0027 when encoding bytes to a hexadecimal string representation. These methods are more efficient and allocation-friendly than using \u0027BitConverter.ToString\u0027 in combination with \u0027String.Replace\u0027 to replace dashes and \u0027String.ToLower\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA1872",
+ "title": "Prefer \u0027Convert.ToHexString\u0027 and \u0027Convert.ToHexStringLower\u0027 over call chains based on \u0027BitConverter.ToString\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca1872",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Use \u0027Convert.ToHexString\u0027 or \u0027Convert.ToHexStringLower\u0027 when encoding bytes to a hexadecimal string representation. These methods are more efficient and allocation-friendly than using \u0027BitConverter.ToString\u0027 in combination with \u0027String.Replace\u0027 to replace dashes and \u0027String.ToLower\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2000",
+ "title": "Dispose objects before losing scope",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2000",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "If a disposable object is not explicitly disposed before all references to it are out of scope, the object will be disposed at some indeterminate time when the garbage collector runs the finalizer of the object. Because an exceptional event might occur that will prevent the finalizer of the object from running, the object should be explicitly disposed instead.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2002",
+ "title": "Do not lock on objects with weak identity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An object is said to have a weak identity when it can be directly accessed across application domain boundaries. A thread that tries to acquire a lock on an object that has a weak identity can be blocked by a second thread in a different application domain that has a lock on the same object.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2002",
+ "title": "Do not lock on objects with weak identity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An object is said to have a weak identity when it can be directly accessed across application domain boundaries. A thread that tries to acquire a lock on an object that has a weak identity can be blocked by a second thread in a different application domain that has a lock on the same object.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2007",
+ "title": "Consider calling ConfigureAwait on the awaited task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2007",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When an asynchronous method awaits a Task directly, continuation occurs in the same thread that created the task. Consider calling Task.ConfigureAwait(Boolean) to signal your intention for continuation. Call ConfigureAwait(false) on the task to schedule continuations to the thread pool, thereby avoiding a deadlock on the UI thread. Passing false is a good option for app-independent libraries. Calling ConfigureAwait(true) on the task has the same behavior as not explicitly calling ConfigureAwait. By explicitly calling this method, you\u0027re letting readers know you intentionally want to perform the continuation on the original synchronization context.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2007",
+ "title": "Consider calling ConfigureAwait on the awaited task",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2007",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When an asynchronous method awaits a Task directly, continuation occurs in the same thread that created the task. Consider calling Task.ConfigureAwait(Boolean) to signal your intention for continuation. Call ConfigureAwait(false) on the task to schedule continuations to the thread pool, thereby avoiding a deadlock on the UI thread. Passing false is a good option for app-independent libraries. Calling ConfigureAwait(true) on the task has the same behavior as not explicitly calling ConfigureAwait. By explicitly calling this method, you\u0027re letting readers know you intentionally want to perform the continuation on the original synchronization context.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2008",
+ "title": "Do not create tasks without passing a TaskScheduler",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Do not create tasks unless you are using one of the overloads that takes a TaskScheduler. The default is to schedule on TaskScheduler.Current, which would lead to deadlocks. Either use TaskScheduler.Default to schedule on the thread pool, or explicitly pass TaskScheduler.Current to make your intentions clear.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2008",
+ "title": "Do not create tasks without passing a TaskScheduler",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Do not create tasks unless you are using one of the overloads that takes a TaskScheduler. The default is to schedule on TaskScheduler.Current, which would lead to deadlocks. Either use TaskScheduler.Default to schedule on the thread pool, or explicitly pass TaskScheduler.Current to make your intentions clear.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2009",
+ "title": "Do not call ToImmutableCollection on an ImmutableCollection value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2009",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2009",
+ "title": "Do not call ToImmutableCollection on an ImmutableCollection value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2009",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2011",
+ "title": "Avoid infinite recursion",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2011",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2011",
+ "title": "Avoid infinite recursion",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2011",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2011",
+ "title": "Avoid infinite recursion",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2011",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2011",
+ "title": "Avoid infinite recursion",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2011",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2012",
+ "title": "Use ValueTasks correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2012",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "ValueTasks returned from member invocations are intended to be directly awaited. Attempts to consume a ValueTask multiple times or to directly access one\u0027s result before it\u0027s known to be completed may result in an exception or corruption. Ignoring such a ValueTask is likely an indication of a functional bug and may degrade performance.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2013",
+ "title": "Do not use ReferenceEquals with value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2013",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Value type typed arguments are uniquely boxed for each call to this method, therefore the result can be unexpected.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2013",
+ "title": "Do not use ReferenceEquals with value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2013",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Value type typed arguments are uniquely boxed for each call to this method, therefore the result can be unexpected.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2013",
+ "title": "Do not use ReferenceEquals with value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2013",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Value type typed arguments are uniquely boxed for each call to this method, therefore the result can be unexpected.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2013",
+ "title": "Do not use ReferenceEquals with value types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2013",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Value type typed arguments are uniquely boxed for each call to this method, therefore the result can be unexpected.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2014",
+ "title": "Do not use stackalloc in loops",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2014",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Stack space allocated by a stackalloc is only released at the end of the current method\u0027s invocation. Using it in a loop can result in unbounded stack growth and eventual stack overflow conditions.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2015",
+ "title": "Do not define finalizers for types derived from MemoryManager\u003CT\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2015",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Adding a finalizer to a type derived from MemoryManager\u003CT\u003E may permit memory to be freed while it is still in use by a Span\u003CT\u003E.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2015",
+ "title": "Do not define finalizers for types derived from MemoryManager\u003CT\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2015",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Adding a finalizer to a type derived from MemoryManager\u003CT\u003E may permit memory to be freed while it is still in use by a Span\u003CT\u003E.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2016",
+ "title": "Forward the \u0027CancellationToken\u0027 parameter to methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2016",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Forward the \u0027CancellationToken\u0027 parameter to methods to ensure the operation cancellation notifications gets properly propagated, or pass in \u0027CancellationToken.None\u0027 explicitly to indicate intentionally not propagating the token.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2016",
+ "title": "Forward the \u0027CancellationToken\u0027 parameter to methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2016",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Forward the \u0027CancellationToken\u0027 parameter to methods to ensure the operation cancellation notifications gets properly propagated, or pass in \u0027CancellationToken.None\u0027 explicitly to indicate intentionally not propagating the token.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2017",
+ "title": "Parameter count mismatch",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Number of parameters supplied in the logging message template do not match the number of named placeholders.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2017",
+ "title": "Parameter count mismatch",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2017",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Number of parameters supplied in the logging message template do not match the number of named placeholders.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2018",
+ "title": "\u0027Buffer.BlockCopy\u0027 expects the number of bytes to be copied for the \u0027count\u0027 argument",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2018",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027Buffer.BlockCopy\u0027 expects the number of bytes to be copied for the \u0027count\u0027 argument. Using \u0027Array.Length\u0027 may not match the number of bytes that needs to be copied.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2018",
+ "title": "\u0027Buffer.BlockCopy\u0027 expects the number of bytes to be copied for the \u0027count\u0027 argument",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2018",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027Buffer.BlockCopy\u0027 expects the number of bytes to be copied for the \u0027count\u0027 argument. Using \u0027Array.Length\u0027 may not match the number of bytes that needs to be copied.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2019",
+ "title": "Improper \u0027ThreadStatic\u0027 field initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2019",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThreadStatic\u0027 fields should be initialized lazily on use, not with inline initialization nor explicitly in a static constructor, which would only initialize the field on the thread that runs the type\u0027s static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2019",
+ "title": "Improper \u0027ThreadStatic\u0027 field initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2019",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThreadStatic\u0027 fields should be initialized lazily on use, not with inline initialization nor explicitly in a static constructor, which would only initialize the field on the thread that runs the type\u0027s static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2020",
+ "title": "Prevent behavioral change",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2020",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Some built-in operators added in .NET 7 behave differently when overflowing than did the corresponding user-defined operators in .NET 6 and earlier versions. Some operators that previously threw in an unchecked context now don\u0027t throw unless wrapped within a checked context. Also, some operators that did not previously throw in a checked context now throw unless wrapped in an unchecked context.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2020",
+ "title": "Prevent behavioral change",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2020",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Some built-in operators added in .NET 7 behave differently when overflowing than did the corresponding user-defined operators in .NET 6 and earlier versions. Some operators that previously threw in an unchecked context now don\u0027t throw unless wrapped within a checked context. Also, some operators that did not previously throw in a checked context now throw unless wrapped in an unchecked context.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2020",
+ "title": "Prevent behavioral change",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2020",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Some built-in operators added in .NET 7 behave differently when overflowing than did the corresponding user-defined operators in .NET 6 and earlier versions. Some operators that previously threw in an unchecked context now don\u0027t throw unless wrapped within a checked context. Also, some operators that did not previously throw in a checked context now throw unless wrapped in an unchecked context.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2021",
+ "title": "Do not call Enumerable.Cast\u003CT\u003E or Enumerable.OfType\u003CT\u003E with incompatible types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Cast\u003CT\u003E and Enumerable.OfType\u003CT\u003E require compatible types to function expectedly. \r\nThe generic cast (IL \u0027unbox.any\u0027) used by the sequence returned by Enumerable.Cast\u003CT\u003E will throw InvalidCastException at runtime on elements of the types specified. \r\nThe generic type check (C# \u0027is\u0027 operator/IL \u0027isinst\u0027) used by Enumerable.OfType\u003CT\u003E will never succeed with elements of types specified, resulting in an empty sequence. \r\nWidening and user defined conversions are not supported with generic types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2021",
+ "title": "Do not call Enumerable.Cast\u003CT\u003E or Enumerable.OfType\u003CT\u003E with incompatible types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Cast\u003CT\u003E and Enumerable.OfType\u003CT\u003E require compatible types to function expectedly. \r\nThe generic cast (IL \u0027unbox.any\u0027) used by the sequence returned by Enumerable.Cast\u003CT\u003E will throw InvalidCastException at runtime on elements of the types specified. \r\nThe generic type check (C# \u0027is\u0027 operator/IL \u0027isinst\u0027) used by Enumerable.OfType\u003CT\u003E will never succeed with elements of types specified, resulting in an empty sequence. \r\nWidening and user defined conversions are not supported with generic types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2021",
+ "title": "Do not call Enumerable.Cast\u003CT\u003E or Enumerable.OfType\u003CT\u003E with incompatible types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Cast\u003CT\u003E and Enumerable.OfType\u003CT\u003E require compatible types to function expectedly. \r\nThe generic cast (IL \u0027unbox.any\u0027) used by the sequence returned by Enumerable.Cast\u003CT\u003E will throw InvalidCastException at runtime on elements of the types specified. \r\nThe generic type check (C# \u0027is\u0027 operator/IL \u0027isinst\u0027) used by Enumerable.OfType\u003CT\u003E will never succeed with elements of types specified, resulting in an empty sequence. \r\nWidening and user defined conversions are not supported with generic types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2021",
+ "title": "Do not call Enumerable.Cast\u003CT\u003E or Enumerable.OfType\u003CT\u003E with incompatible types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2021",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Enumerable.Cast\u003CT\u003E and Enumerable.OfType\u003CT\u003E require compatible types to function expectedly. \r\nThe generic cast (IL \u0027unbox.any\u0027) used by the sequence returned by Enumerable.Cast\u003CT\u003E will throw InvalidCastException at runtime on elements of the types specified. \r\nThe generic type check (C# \u0027is\u0027 operator/IL \u0027isinst\u0027) used by Enumerable.OfType\u003CT\u003E will never succeed with elements of types specified, resulting in an empty sequence. \r\nWidening and user defined conversions are not supported with generic types.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2022",
+ "title": "Avoid inexact read with \u0027Stream.Read\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2022",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to \u0027Stream.Read\u0027 may return fewer bytes than requested, resulting in unreliable code if the return value is not checked.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2022",
+ "title": "Avoid inexact read with \u0027Stream.Read\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2022",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to \u0027Stream.Read\u0027 may return fewer bytes than requested, resulting in unreliable code if the return value is not checked.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2100",
+ "title": "Review SQL queries for security vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2100",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "SQL queries that directly use user input can be vulnerable to SQL injection attacks. Review this SQL query for potential vulnerabilities, and consider using a parameterized SQL query.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2100",
+ "title": "Review SQL queries for security vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2100",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "SQL queries that directly use user input can be vulnerable to SQL injection attacks. Review this SQL query for potential vulnerabilities, and consider using a parameterized SQL query.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2101",
+ "title": "Specify marshaling for P/Invoke string arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2101",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A platform invoke member allows partially trusted callers, has a string parameter, and does not explicitly marshal the string. This can cause a potential security vulnerability.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2101",
+ "title": "Specify marshaling for P/Invoke string arguments",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2101",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A platform invoke member allows partially trusted callers, has a string parameter, and does not explicitly marshal the string. This can cause a potential security vulnerability.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2119",
+ "title": "Seal methods that satisfy private interfaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2119",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An inheritable public type provides an overridable method implementation of an internal (Friend in Visual Basic) interface. To fix a violation of this rule, prevent the method from being overridden outside the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2119",
+ "title": "Seal methods that satisfy private interfaces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2119",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An inheritable public type provides an overridable method implementation of an internal (Friend in Visual Basic) interface. To fix a violation of this rule, prevent the method from being overridden outside the assembly.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2153",
+ "title": "Do Not Catch Corrupted State Exceptions",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2153",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Catching corrupted state exceptions could mask errors (such as access violations), resulting in inconsistent state of execution or making it easier for attackers to compromise system. Instead, catch and handle a more specific set of exception type(s) or re-throw the exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2153",
+ "title": "Do Not Catch Corrupted State Exceptions",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2153",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Catching corrupted state exceptions could mask errors (such as access violations), resulting in inconsistent state of execution or making it easier for attackers to compromise system. Instead, catch and handle a more specific set of exception type(s) or re-throw the exception.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2200",
+ "title": "Rethrow to preserve stack details",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2200",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2200",
+ "title": "Rethrow to preserve stack details",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2200",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2201",
+ "title": "Do not raise reserved exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2201",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An exception of type that is not sufficiently specific or reserved by the runtime should never be raised by user code. This makes the original error difficult to detect and debug. If this exception instance might be thrown, use a different exception type.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2201",
+ "title": "Do not raise reserved exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2201",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An exception of type that is not sufficiently specific or reserved by the runtime should never be raised by user code. This makes the original error difficult to detect and debug. If this exception instance might be thrown, use a different exception type.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2201",
+ "title": "Do not raise reserved exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2201",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An exception of type that is not sufficiently specific or reserved by the runtime should never be raised by user code. This makes the original error difficult to detect and debug. If this exception instance might be thrown, use a different exception type.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2201",
+ "title": "Do not raise reserved exception types",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2201",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An exception of type that is not sufficiently specific or reserved by the runtime should never be raised by user code. This makes the original error difficult to detect and debug. If this exception instance might be thrown, use a different exception type.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2207",
+ "title": "Initialize value type static fields inline",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2207",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A value type declares an explicit static constructor. To fix a violation of this rule, initialize all static data when it is declared and remove the static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2207",
+ "title": "Initialize value type static fields inline",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2207",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A value type declares an explicit static constructor. To fix a violation of this rule, initialize all static data when it is declared and remove the static constructor.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2208",
+ "title": "Instantiate argument exceptions correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2208",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A call is made to the default (parameterless) constructor of an exception type that is or derives from ArgumentException, or an incorrect string argument is passed to a parameterized constructor of an exception type that is or derives from ArgumentException.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2211",
+ "title": "Non-constant fields should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2211",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Static fields that are neither constants nor read-only are not thread-safe. Access to such a field must be carefully controlled and requires advanced programming techniques to synchronize access to the class object.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2211",
+ "title": "Non-constant fields should not be visible",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2211",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Static fields that are neither constants nor read-only are not thread-safe. Access to such a field must be carefully controlled and requires advanced programming techniques to synchronize access to the class object.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2213",
+ "title": "Disposable fields should be disposed",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2213",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type that implements System.IDisposable declares fields that are of types that also implement IDisposable. The Dispose method of the field is not called by the Dispose method of the declaring type. To fix a violation of this rule, call Dispose on fields that are of types that implement IDisposable if you are responsible for allocating and releasing the unmanaged resources held by the field.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2213",
+ "title": "Disposable fields should be disposed",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2213",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type that implements System.IDisposable declares fields that are of types that also implement IDisposable. The Dispose method of the field is not called by the Dispose method of the declaring type. To fix a violation of this rule, call Dispose on fields that are of types that implement IDisposable if you are responsible for allocating and releasing the unmanaged resources held by the field.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2214",
+ "title": "Do not call overridable methods in constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2214",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Virtual methods defined on the class should not be called from constructors. If a derived class has overridden the method, the derived class version will be called (before the derived class constructor is called).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2214",
+ "title": "Do not call overridable methods in constructors",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2214",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Virtual methods defined on the class should not be called from constructors. If a derived class has overridden the method, the derived class version will be called (before the derived class constructor is called).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2215",
+ "title": "Dispose methods should call base class dispose",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2215",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A type that implements System.IDisposable inherits from a type that also implements IDisposable. The Dispose method of the inheriting type does not call the Dispose method of the parent type. To fix a violation of this rule, call base.Dispose in your Dispose method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2215",
+ "title": "Dispose methods should call base class dispose",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2215",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A type that implements System.IDisposable inherits from a type that also implements IDisposable. The Dispose method of the inheriting type does not call the Dispose method of the parent type. To fix a violation of this rule, call base.Dispose in your Dispose method.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2216",
+ "title": "Disposable types should declare finalizer",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2216",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type that implements System.IDisposable and has fields that suggest the use of unmanaged resources does not implement a finalizer, as described by Object.Finalize.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2216",
+ "title": "Disposable types should declare finalizer",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2216",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type that implements System.IDisposable and has fields that suggest the use of unmanaged resources does not implement a finalizer, as described by Object.Finalize.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2217",
+ "title": "Do not mark enums with FlagsAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2217",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible enumeration is marked by using FlagsAttribute, and it has one or more values that are not powers of two or a combination of the other defined values on the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2217",
+ "title": "Do not mark enums with FlagsAttribute",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2217",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An externally visible enumeration is marked by using FlagsAttribute, and it has one or more values that are not powers of two or a combination of the other defined values on the enumeration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2218",
+ "title": "Override GetHashCode on overriding Equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2218",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "GetHashCode returns a value, based on the current instance, that is suited for hashing algorithms and data structures such as a hash table. Two objects that are the same type and are equal must return the same hash code.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2219",
+ "title": "Do not raise exceptions in finally clauses",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2219",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "When an exception is raised in a finally clause, the new exception hides the active exception. This makes the original error difficult to detect and debug.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2219",
+ "title": "Do not raise exceptions in finally clauses",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2219",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "When an exception is raised in a finally clause, the new exception hides the active exception. This makes the original error difficult to detect and debug.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2224",
+ "title": "Override Equals on overloading operator equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2224",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "A public type implements the equality operator but does not override Object.Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2225",
+ "title": "Operator overloads have named alternates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2225",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An operator overload was detected, and the expected named alternative method was not found. The named alternative member provides access to the same functionality as the operator and is provided for developers who program in languages that do not support overloaded operators.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2226",
+ "title": "Operators should have symmetrical overloads",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2226",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type implements the equality or inequality operator and does not implement the opposite operator.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2226",
+ "title": "Operators should have symmetrical overloads",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2226",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A type implements the equality or inequality operator and does not implement the opposite operator.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2227",
+ "title": "Collection properties should be read only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2227",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A writable collection property allows a user to replace the collection with a different collection. A read-only property stops the collection from being replaced but still allows the individual members to be set.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2227",
+ "title": "Collection properties should be read only",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2227",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A writable collection property allows a user to replace the collection with a different collection. A read-only property stops the collection from being replaced but still allows the individual members to be set.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2231",
+ "title": "Overload operator equals on overriding value type Equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2231",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "In most programming languages there is no default implementation of the equality operator (==) for value types. If your programming language supports operator overloads, you should consider implementing the equality operator. Its behavior should be identical to that of Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2231",
+ "title": "Overload operator equals on overriding value type Equals",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2231",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "In most programming languages there is no default implementation of the equality operator (==) for value types. If your programming language supports operator overloads, you should consider implementing the equality operator. Its behavior should be identical to that of Equals.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2234",
+ "title": "Pass system uri objects instead of strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2234",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A call is made to a method that has a string parameter whose name contains \u0022uri\u0022, \u0022URI\u0022, \u0022urn\u0022, \u0022URN\u0022, \u0022url\u0022, or \u0022URL\u0022. The declaring type of the method contains a corresponding method overload that has a System.Uri parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2234",
+ "title": "Pass system uri objects instead of strings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2234",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A call is made to a method that has a string parameter whose name contains \u0022uri\u0022, \u0022URI\u0022, \u0022urn\u0022, \u0022URN\u0022, \u0022url\u0022, or \u0022URL\u0022. The declaring type of the method contains a corresponding method overload that has a System.Uri parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2235",
+ "title": "Mark all non-serializable fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2235",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An instance field of a type that is not serializable is declared in a type that is serializable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2235",
+ "title": "Mark all non-serializable fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2235",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An instance field of a type that is not serializable is declared in a type that is serializable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2237",
+ "title": "Mark ISerializable types with serializable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2237",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "To be recognized by the common language runtime as serializable, types must be marked by using the SerializableAttribute attribute even when the type uses a custom serialization routine through implementation of the ISerializable interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2237",
+ "title": "Mark ISerializable types with serializable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2237",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "To be recognized by the common language runtime as serializable, types must be marked by using the SerializableAttribute attribute even when the type uses a custom serialization routine through implementation of the ISerializable interface.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2241",
+ "title": "Provide correct arguments to formatting methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2241",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The format argument that is passed to System.String.Format does not contain a format item that corresponds to each object argument, or vice versa.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2241",
+ "title": "Provide correct arguments to formatting methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2241",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The format argument that is passed to System.String.Format does not contain a format item that corresponds to each object argument, or vice versa.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2241",
+ "title": "Provide correct arguments to formatting methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2241",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The format argument that is passed to System.String.Format does not contain a format item that corresponds to each object argument, or vice versa.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2241",
+ "title": "Provide correct arguments to formatting methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2241",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The format argument that is passed to System.String.Format does not contain a format item that corresponds to each object argument, or vice versa.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2242",
+ "title": "Test for NaN correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2242",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This expression tests a value against Single.Nan or Double.Nan. Use Single.IsNan(Single) or Double.IsNan(Double) to test the value.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2242",
+ "title": "Test for NaN correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2242",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "This expression tests a value against Single.Nan or Double.Nan. Use Single.IsNan(Single) or Double.IsNan(Double) to test the value.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2243",
+ "title": "Attribute string literals should parse correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2243",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The string literal parameter of an attribute does not parse correctly for a URL, a GUID, or a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2243",
+ "title": "Attribute string literals should parse correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2243",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The string literal parameter of an attribute does not parse correctly for a URL, a GUID, or a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2243",
+ "title": "Attribute string literals should parse correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2243",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The string literal parameter of an attribute does not parse correctly for a URL, a GUID, or a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2243",
+ "title": "Attribute string literals should parse correctly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2243",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The string literal parameter of an attribute does not parse correctly for a URL, a GUID, or a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2244",
+ "title": "Do not duplicate indexed element initializations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2244",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Indexed elements in objects initializers must initialize unique elements. A duplicate index might overwrite a previous element initialization.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2244",
+ "title": "Do not duplicate indexed element initializations",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2244",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Indexed elements in objects initializers must initialize unique elements. A duplicate index might overwrite a previous element initialization.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2245",
+ "title": "Do not assign a property to itself",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2245",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2245",
+ "title": "Do not assign a property to itself",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2245",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2246",
+ "title": "Assigning symbol and its member in the same statement",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2246",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Assigning to a symbol and its member (field/property) in the same statement is not recommended. It is not clear if the member access was intended to use symbol\u0027s old value prior to the assignment or new value from the assignment in this statement. For clarity, consider splitting the assignments into separate statements.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2246",
+ "title": "Assigning symbol and its member in the same statement",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2246",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Assigning to a symbol and its member (field/property) in the same statement is not recommended. It is not clear if the member access was intended to use symbol\u0027s old value prior to the assignment or new value from the assignment in this statement. For clarity, consider splitting the assignments into separate statements.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2247",
+ "title": "Argument passed to TaskCompletionSource constructor should be TaskCreationOptions enum instead of TaskContinuationOptions enum",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2247",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "TaskCompletionSource has constructors that take TaskCreationOptions that control the underlying Task, and constructors that take object state that\u0027s stored in the task. Accidentally passing a TaskContinuationOptions instead of a TaskCreationOptions will result in the call treating the options as state.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2247",
+ "title": "Argument passed to TaskCompletionSource constructor should be TaskCreationOptions enum instead of TaskContinuationOptions enum",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2247",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "TaskCompletionSource has constructors that take TaskCreationOptions that control the underlying Task, and constructors that take object state that\u0027s stored in the task. Accidentally passing a TaskContinuationOptions instead of a TaskCreationOptions will result in the call treating the options as state.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2248",
+ "title": "Provide correct \u0027enum\u0027 argument to \u0027Enum.HasFlag\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2248",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Enum.HasFlag\u0027 method expects the \u0027enum\u0027 argument to be of the same \u0027enum\u0027 type as the instance on which the method is invoked and that this \u0027enum\u0027 is marked with \u0027System.FlagsAttribute\u0027. If these are different \u0027enum\u0027 types, an unhandled exception will be thrown at runtime. If the \u0027enum\u0027 type is not marked with \u0027System.FlagsAttribute\u0027 the call will always return \u0027false\u0027 at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2248",
+ "title": "Provide correct \u0027enum\u0027 argument to \u0027Enum.HasFlag\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2248",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027Enum.HasFlag\u0027 method expects the \u0027enum\u0027 argument to be of the same \u0027enum\u0027 type as the instance on which the method is invoked and that this \u0027enum\u0027 is marked with \u0027System.FlagsAttribute\u0027. If these are different \u0027enum\u0027 types, an unhandled exception will be thrown at runtime. If the \u0027enum\u0027 type is not marked with \u0027System.FlagsAttribute\u0027 the call will always return \u0027false\u0027 at runtime.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2249",
+ "title": "Consider using \u0027string.Contains\u0027 instead of \u0027string.IndexOf\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2249",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Calls to \u0027string.IndexOf\u0027 where the result is used to check for the presence/absence of a substring can be replaced by \u0027string.Contains\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2249",
+ "title": "Consider using \u0027string.Contains\u0027 instead of \u0027string.IndexOf\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2249",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Calls to \u0027string.IndexOf\u0027 where the result is used to check for the presence/absence of a substring can be replaced by \u0027string.Contains\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2250",
+ "title": "Use \u0027ThrowIfCancellationRequested\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2250",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThrowIfCancellationRequested\u0027 automatically checks whether the token has been canceled, and throws an \u0027OperationCanceledException\u0027 if it has.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2250",
+ "title": "Use \u0027ThrowIfCancellationRequested\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2250",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThrowIfCancellationRequested\u0027 automatically checks whether the token has been canceled, and throws an \u0027OperationCanceledException\u0027 if it has.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2251",
+ "title": "Use \u0027string.Equals\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2251",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "It is both clearer and likely faster to use \u0027string.Equals\u0027 instead of comparing the result of \u0027string.Compare\u0027 to zero.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2251",
+ "title": "Use \u0027string.Equals\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2251",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "It is both clearer and likely faster to use \u0027string.Equals\u0027 instead of comparing the result of \u0027string.Compare\u0027 to zero.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2252",
+ "title": "This API requires opting into preview features",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2252",
+ "category": "Quality",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "An assembly has to opt into preview features before using them.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2253",
+ "title": "Named placeholders should not be numeric values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2253",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Named placeholders in the logging message template should not be comprised of only numeric characters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2253",
+ "title": "Named placeholders should not be numeric values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2253",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Named placeholders in the logging message template should not be comprised of only numeric characters.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2254",
+ "title": "Template should be a static expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2254",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The logging message template should not vary between calls.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2254",
+ "title": "Template should be a static expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2254",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The logging message template should not vary between calls.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2255",
+ "title": "The \u0027ModuleInitializer\u0027 attribute should not be used in libraries",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2255",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Module initializers are intended to be used by application code to ensure an application\u0027s components are initialized before the application code begins executing. If library code declares a method with the \u0027ModuleInitializerAttribute\u0027, it can interfere with application initialization and also lead to limitations in that application\u0027s trimming abilities. Instead of using methods marked with \u0027ModuleInitializerAttribute\u0027, the library should expose methods that can be used to initialize any components within the library and allow the application to invoke the method during application initialization.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2255",
+ "title": "The \u0027ModuleInitializer\u0027 attribute should not be used in libraries",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2255",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Module initializers are intended to be used by application code to ensure an application\u0027s components are initialized before the application code begins executing. If library code declares a method with the \u0027ModuleInitializerAttribute\u0027, it can interfere with application initialization and also lead to limitations in that application\u0027s trimming abilities. Instead of using methods marked with \u0027ModuleInitializerAttribute\u0027, the library should expose methods that can be used to initialize any components within the library and allow the application to invoke the method during application initialization.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2256",
+ "title": "All members declared in parent interfaces must have an implementation in a DynamicInterfaceCastableImplementation-attributed interface",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2256",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Types attributed with \u0027DynamicInterfaceCastableImplementationAttribute\u0027 act as an interface implementation for a type that implements the \u0027IDynamicInterfaceCastable\u0027 type. As a result, it must provide an implementation of all of the members defined in the inherited interfaces, because the type that implements \u0027IDynamicInterfaceCastable\u0027 will not provide them otherwise.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2256",
+ "title": "All members declared in parent interfaces must have an implementation in a DynamicInterfaceCastableImplementation-attributed interface",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2256",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Types attributed with \u0027DynamicInterfaceCastableImplementationAttribute\u0027 act as an interface implementation for a type that implements the \u0027IDynamicInterfaceCastable\u0027 type. As a result, it must provide an implementation of all of the members defined in the inherited interfaces, because the type that implements \u0027IDynamicInterfaceCastable\u0027 will not provide them otherwise.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2257",
+ "title": "Members defined on an interface with the \u0027DynamicInterfaceCastableImplementationAttribute\u0027 should be \u0027static\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2257",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Since a type that implements \u0027IDynamicInterfaceCastable\u0027 may not implement a dynamic interface in metadata, calls to an instance interface member that is not an explicit implementation defined on this type are likely to fail at runtime. Mark new interface members \u0027static\u0027 to avoid runtime errors.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2257",
+ "title": "Members defined on an interface with the \u0027DynamicInterfaceCastableImplementationAttribute\u0027 should be \u0027static\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2257",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Since a type that implements \u0027IDynamicInterfaceCastable\u0027 may not implement a dynamic interface in metadata, calls to an instance interface member that is not an explicit implementation defined on this type are likely to fail at runtime. Mark new interface members \u0027static\u0027 to avoid runtime errors.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2258",
+ "title": "Providing a \u0027DynamicInterfaceCastableImplementation\u0027 interface in Visual Basic is unsupported",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2258",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Providing a functional \u0027DynamicInterfaceCastableImplementationAttribute\u0027-attributed interface requires the Default Interface Members feature, which is unsupported in Visual Basic.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2258",
+ "title": "Providing a \u0027DynamicInterfaceCastableImplementation\u0027 interface in Visual Basic is unsupported",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2258",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Providing a functional \u0027DynamicInterfaceCastableImplementationAttribute\u0027-attributed interface requires the Default Interface Members feature, which is unsupported in Visual Basic.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2259",
+ "title": "\u0027ThreadStatic\u0027 only affects static fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2259",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThreadStatic\u0027 only affects static fields. When applied to instance fields, it has no impact on behavior.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2259",
+ "title": "\u0027ThreadStatic\u0027 only affects static fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2259",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027ThreadStatic\u0027 only affects static fields. When applied to instance fields, it has no impact on behavior.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2260",
+ "title": "Use correct type parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2260",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Generic math interfaces require the derived type itself to be used for the self recurring type parameter.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2261",
+ "title": "Do not use ConfigureAwaitOptions.SuppressThrowing with Task\u003CTResult\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2261",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The ConfigureAwaitOptions.SuppressThrowing option is only supported with the non-generic Task, not a Task\u003CTResult\u003E. To use it with a Task\u003CTResult\u003E, first cast to the base Task.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2261",
+ "title": "Do not use ConfigureAwaitOptions.SuppressThrowing with Task\u003CTResult\u003E",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2261",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The ConfigureAwaitOptions.SuppressThrowing option is only supported with the non-generic Task, not a Task\u003CTResult\u003E. To use it with a Task\u003CTResult\u003E, first cast to the base Task.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2262",
+ "title": "Set \u0027MaxResponseHeadersLength\u0027 properly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2262",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The property \u0027MaxResponseHeadersLength\u0027 is measured in kilobytes, not in bytes. The provided value is multiplied by 1024, which might be greater than your intended maximum length.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2262",
+ "title": "Set \u0027MaxResponseHeadersLength\u0027 properly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2262",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The property \u0027MaxResponseHeadersLength\u0027 is measured in kilobytes, not in bytes. The provided value is multiplied by 1024, which might be greater than your intended maximum length.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2263",
+ "title": "Prefer generic overload when type is known",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2263",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using a generic overload is preferable to the \u0027System.Type\u0027 overload when the type is known, promoting cleaner and more type-safe code with improved compile-time checks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2263",
+ "title": "Prefer generic overload when type is known",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2263",
+ "category": "Quality",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "Using a generic overload is preferable to the \u0027System.Type\u0027 overload when the type is known, promoting cleaner and more type-safe code with improved compile-time checks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2264",
+ "title": "Do not pass a non-nullable value to \u0027ArgumentNullException.ThrowIfNull\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2264",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027ArgumentNullException.ThrowIfNull\u0027 throws when the passed argument is \u0027null\u0027. Certain constructs like non-nullable structs, \u0027nameof()\u0027 and \u0027new\u0027 expressions are known to never be null, so \u0027ArgumentNullException.ThrowIfNull\u0027 will never throw.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2264",
+ "title": "Do not pass a non-nullable value to \u0027ArgumentNullException.ThrowIfNull\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2264",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u0027ArgumentNullException.ThrowIfNull\u0027 throws when the passed argument is \u0027null\u0027. Certain constructs like non-nullable structs, \u0027nameof()\u0027 and \u0027new\u0027 expressions are known to never be null, so \u0027ArgumentNullException.ThrowIfNull\u0027 will never throw.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2265",
+ "title": "Do not compare Span\u003CT\u003E to \u0027null\u0027 or \u0027default\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2265",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Comparing a span to \u0027null\u0027 or \u0027default\u0027 might not do what you intended. \u0027default\u0027 and the \u0027null\u0027 literal are implicitly converted to \u0027Span\u003CT\u003E.Empty\u0027. Remove the redundant comparison or make the code more explicit by using \u0027IsEmpty\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2265",
+ "title": "Do not compare Span\u003CT\u003E to \u0027null\u0027 or \u0027default\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2265",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Comparing a span to \u0027null\u0027 or \u0027default\u0027 might not do what you intended. \u0027default\u0027 and the \u0027null\u0027 literal are implicitly converted to \u0027Span\u003CT\u003E.Empty\u0027. Remove the redundant comparison or make the code more explicit by using \u0027IsEmpty\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2265",
+ "title": "Do not compare Span\u003CT\u003E to \u0027null\u0027 or \u0027default\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2265",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Comparing a span to \u0027null\u0027 or \u0027default\u0027 might not do what you intended. \u0027default\u0027 and the \u0027null\u0027 literal are implicitly converted to \u0027Span\u003CT\u003E.Empty\u0027. Remove the redundant comparison or make the code more explicit by using \u0027IsEmpty\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2265",
+ "title": "Do not compare Span\u003CT\u003E to \u0027null\u0027 or \u0027default\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2265",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Comparing a span to \u0027null\u0027 or \u0027default\u0027 might not do what you intended. \u0027default\u0027 and the \u0027null\u0027 literal are implicitly converted to \u0027Span\u003CT\u003E.Empty\u0027. Remove the redundant comparison or make the code more explicit by using \u0027IsEmpty\u0027.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2300",
+ "title": "Do not use insecure deserializer BinaryFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2300",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The method \u0027{0}\u0027 is insecure when deserializing untrusted data. If you need to instead detect BinaryFormatter deserialization without a SerializationBinder set, then disable rule CA2300, and enable rules CA2301 and CA2302.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2300",
+ "title": "Do not use insecure deserializer BinaryFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2300",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The method \u0027{0}\u0027 is insecure when deserializing untrusted data. If you need to instead detect BinaryFormatter deserialization without a SerializationBinder set, then disable rule CA2300, and enable rules CA2301 and CA2302.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2301",
+ "title": "Do not call BinaryFormatter.Deserialize without first setting BinaryFormatter.Binder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2301",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2301",
+ "title": "Do not call BinaryFormatter.Deserialize without first setting BinaryFormatter.Binder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2301",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2302",
+ "title": "Ensure BinaryFormatter.Binder is set before calling BinaryFormatter.Deserialize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2302",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2302",
+ "title": "Ensure BinaryFormatter.Binder is set before calling BinaryFormatter.Deserialize",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2302",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2305",
+ "title": "Do not use insecure deserializer LosFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2305",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2305",
+ "title": "Do not use insecure deserializer LosFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2305",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2310",
+ "title": "Do not use insecure deserializer NetDataContractSerializer",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2310",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The method \u0027{0}\u0027 is insecure when deserializing untrusted data. If you need to instead detect NetDataContractSerializer deserialization without a SerializationBinder set, then disable rule CA2310, and enable rules CA2311 and CA2312.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2310",
+ "title": "Do not use insecure deserializer NetDataContractSerializer",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2310",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The method \u0027{0}\u0027 is insecure when deserializing untrusted data. If you need to instead detect NetDataContractSerializer deserialization without a SerializationBinder set, then disable rule CA2310, and enable rules CA2311 and CA2312.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2311",
+ "title": "Do not deserialize without first setting NetDataContractSerializer.Binder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2311",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2311",
+ "title": "Do not deserialize without first setting NetDataContractSerializer.Binder",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2311",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2312",
+ "title": "Ensure NetDataContractSerializer.Binder is set before deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2312",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2312",
+ "title": "Ensure NetDataContractSerializer.Binder is set before deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2312",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2315",
+ "title": "Do not use insecure deserializer ObjectStateFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2315",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2315",
+ "title": "Do not use insecure deserializer ObjectStateFormatter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2315",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2321",
+ "title": "Do not deserialize with JavaScriptSerializer using a SimpleTypeResolver",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2321",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2321",
+ "title": "Do not deserialize with JavaScriptSerializer using a SimpleTypeResolver",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2321",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2322",
+ "title": "Ensure JavaScriptSerializer is not initialized with SimpleTypeResolver before deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2322",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2322",
+ "title": "Ensure JavaScriptSerializer is not initialized with SimpleTypeResolver before deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2322",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2326",
+ "title": "Do not use TypeNameHandling values other than None",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2326",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Deserializing JSON when using a TypeNameHandling value other than None can be insecure. If you need to instead detect Json.NET deserialization when a SerializationBinder isn\u0027t specified, then disable rule CA2326, and enable rules CA2327, CA2328, CA2329, and CA2330.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2326",
+ "title": "Do not use TypeNameHandling values other than None",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2326",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Deserializing JSON when using a TypeNameHandling value other than None can be insecure. If you need to instead detect Json.NET deserialization when a SerializationBinder isn\u0027t specified, then disable rule CA2326, and enable rules CA2327, CA2328, CA2329, and CA2330.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2327",
+ "title": "Do not use insecure JsonSerializerSettings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2327",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2327",
+ "title": "Do not use insecure JsonSerializerSettings",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2327",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2328",
+ "title": "Ensure that JsonSerializerSettings are secure",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2328",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2328",
+ "title": "Ensure that JsonSerializerSettings are secure",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2328",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2329",
+ "title": "Do not deserialize with JsonSerializer using an insecure configuration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2329",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2329",
+ "title": "Do not deserialize with JsonSerializer using an insecure configuration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2329",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2330",
+ "title": "Ensure that JsonSerializer has a secure configuration when deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2330",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2330",
+ "title": "Ensure that JsonSerializer has a secure configuration when deserializing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2330",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2350",
+ "title": "Do not use DataTable.ReadXml() with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2350",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2350",
+ "title": "Do not use DataTable.ReadXml() with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2350",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2351",
+ "title": "Do not use DataSet.ReadXml() with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2351",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2351",
+ "title": "Do not use DataSet.ReadXml() with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2351",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2352",
+ "title": "Unsafe DataSet or DataTable in serializable type can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2352",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2352",
+ "title": "Unsafe DataSet or DataTable in serializable type can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2352",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2353",
+ "title": "Unsafe DataSet or DataTable in serializable type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2353",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2353",
+ "title": "Unsafe DataSet or DataTable in serializable type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2353",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2354",
+ "title": "Unsafe DataSet or DataTable in deserialized object graph can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2354",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2354",
+ "title": "Unsafe DataSet or DataTable in deserialized object graph can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2354",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2355",
+ "title": "Unsafe DataSet or DataTable type found in deserializable object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2355",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2355",
+ "title": "Unsafe DataSet or DataTable type found in deserializable object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2355",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2356",
+ "title": "Unsafe DataSet or DataTable type in web deserializable object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2356",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2356",
+ "title": "Unsafe DataSet or DataTable type in web deserializable object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2356",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2361",
+ "title": "Ensure auto-generated class containing DataSet.ReadXml() is not used with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2361",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2361",
+ "title": "Ensure auto-generated class containing DataSet.ReadXml() is not used with untrusted data",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2361",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2362",
+ "title": "Unsafe DataSet or DataTable in auto-generated serializable type can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2362",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA2362",
+ "title": "Unsafe DataSet or DataTable in auto-generated serializable type can be vulnerable to remote code execution attacks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca2362",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3001",
+ "title": "Review code for SQL injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3001",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3001",
+ "title": "Review code for SQL injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3001",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3002",
+ "title": "Review code for XSS vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3002",
+ "title": "Review code for XSS vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3002",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3003",
+ "title": "Review code for file path injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3003",
+ "title": "Review code for file path injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3003",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3004",
+ "title": "Review code for information disclosure vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3004",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3004",
+ "title": "Review code for information disclosure vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3004",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3005",
+ "title": "Review code for LDAP injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3005",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3005",
+ "title": "Review code for LDAP injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3005",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3006",
+ "title": "Review code for process command injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3006",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3006",
+ "title": "Review code for process command injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3006",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3007",
+ "title": "Review code for open redirect vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3007",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3007",
+ "title": "Review code for open redirect vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3007",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3008",
+ "title": "Review code for XPath injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3008",
+ "title": "Review code for XPath injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3008",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3009",
+ "title": "Review code for XML injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3009",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3009",
+ "title": "Review code for XML injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3009",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3010",
+ "title": "Review code for XAML injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3010",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3010",
+ "title": "Review code for XAML injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3010",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3011",
+ "title": "Review code for DLL injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3011",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3011",
+ "title": "Review code for DLL injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3011",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3012",
+ "title": "Review code for regex injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3012",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3012",
+ "title": "Review code for regex injection vulnerabilities",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3012",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3061",
+ "title": "Do Not Add Schema By URL",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3061",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "This overload of XmlSchemaCollection.Add method internally enables DTD processing on the XML reader instance used, and uses UrlResolver for resolving external XML entities. The outcome is information disclosure. Content from file system or network shares for the machine processing the XML can be exposed to attacker. In addition, an attacker can use this as a DoS vector.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3061",
+ "title": "Do Not Add Schema By URL",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3061",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "This overload of XmlSchemaCollection.Add method internally enables DTD processing on the XML reader instance used, and uses UrlResolver for resolving external XML entities. The outcome is information disclosure. Content from file system or network shares for the machine processing the XML can be exposed to attacker. In addition, an attacker can use this as a DoS vector.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3075",
+ "title": "Insecure DTD processing in XML",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3075",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using XmlTextReader.Load(), creating an insecure XmlReaderSettings instance when invoking XmlReader.Create(), setting the InnerXml property of the XmlDocument and enabling DTD processing using XmlUrlResolver insecurely can lead to information disclosure. Replace it with a call to the Load() method overload that takes an XmlReader instance, use XmlReader.Create() to accept XmlReaderSettings arguments or consider explicitly setting secure values. The DataViewSettingCollectionString property of DataViewManager should always be assigned from a trusted source, the DtdProcessing property should be set to false, and the XmlResolver property should be changed to XmlSecureResolver or null.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3076",
+ "title": "Insecure XSLT script processing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3076",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Providing an insecure XsltSettings instance and an insecure XmlResolver instance to XslCompiledTransform.Load method is potentially unsafe as it allows processing script within XSL, which on an untrusted XSL input may lead to malicious code execution. Either replace the insecure XsltSettings argument with XsltSettings.Default or an instance that has disabled document function and script execution, or replace the XmlResolver argument with null or an XmlSecureResolver instance. This message may be suppressed if the input is known to be from a trusted source and external resource resolution from locations that are not known in advance must be supported.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3076",
+ "title": "Insecure XSLT script processing",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3076",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Providing an insecure XsltSettings instance and an insecure XmlResolver instance to XslCompiledTransform.Load method is potentially unsafe as it allows processing script within XSL, which on an untrusted XSL input may lead to malicious code execution. Either replace the insecure XsltSettings argument with XsltSettings.Default or an instance that has disabled document function and script execution, or replace the XmlResolver argument with null or an XmlSecureResolver instance. This message may be suppressed if the input is known to be from a trusted source and external resource resolution from locations that are not known in advance must be supported.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3077",
+ "title": "Insecure Processing in API Design, XmlDocument and XmlTextReader",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3077",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Enabling DTD processing on all instances derived from XmlTextReader or \u00A0XmlDocument and using XmlUrlResolver for resolving external XML entities may lead to information disclosure. Ensure to set the XmlResolver property to null, create an instance of XmlSecureResolver when processing untrusted input, or use XmlReader.Create method with a secure XmlReaderSettings argument. Unless you need to enable it, ensure the DtdProcessing property is set to false.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3077",
+ "title": "Insecure Processing in API Design, XmlDocument and XmlTextReader",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3077",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Enabling DTD processing on all instances derived from XmlTextReader or \u00A0XmlDocument and using XmlUrlResolver for resolving external XML entities may lead to information disclosure. Ensure to set the XmlResolver property to null, create an instance of XmlSecureResolver when processing untrusted input, or use XmlReader.Create method with a secure XmlReaderSettings argument. Unless you need to enable it, ensure the DtdProcessing property is set to false.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA3147",
+ "title": "Mark Verb Handlers With Validate Antiforgery Token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca3147",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5350",
+ "title": "Do Not Use Weak Cryptographic Algorithms",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5350",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered\u202F messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA-2 512, SHA-2 384, or SHA-2 256.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5350",
+ "title": "Do Not Use Weak Cryptographic Algorithms",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5350",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered\u202F messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA-2 512, SHA-2 384, or SHA-2 256.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5351",
+ "title": "Do Not Use Broken Cryptographic Algorithms",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5351",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An attack making it computationally feasible to break this algorithm exists. This allows attackers to break the cryptographic guarantees it is designed to provide. Depending on the type and application of this cryptographic algorithm, this may allow attackers to read enciphered messages, tamper with enciphered\u202F messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA512, SHA384, or SHA256. Replace digital signature uses with RSA with a key length greater than or equal to 2048-bits, or ECDSA with a key length greater than or equal to 256 bits.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5351",
+ "title": "Do Not Use Broken Cryptographic Algorithms",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5351",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "An attack making it computationally feasible to break this algorithm exists. This allows attackers to break the cryptographic guarantees it is designed to provide. Depending on the type and application of this cryptographic algorithm, this may allow attackers to read enciphered messages, tamper with enciphered\u202F messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA512, SHA384, or SHA256. Replace digital signature uses with RSA with a key length greater than or equal to 2048-bits, or ECDSA with a key length greater than or equal to 256 bits.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5358",
+ "title": "Review cipher mode usage with cryptography experts",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5358",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "These cipher modes might be vulnerable to attacks. Consider using recommended modes (CBC, CTS).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5358",
+ "title": "Review cipher mode usage with cryptography experts",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5358",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "These cipher modes might be vulnerable to attacks. Consider using recommended modes (CBC, CTS).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5359",
+ "title": "Do Not Disable Certificate Validation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5359",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A certificate can help authenticate the identity of the server. Clients should validate the server certificate to ensure requests are sent to the intended server. If the ServerCertificateValidationCallback always returns \u0027true\u0027, any certificate will pass validation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5359",
+ "title": "Do Not Disable Certificate Validation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5359",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A certificate can help authenticate the identity of the server. Clients should validate the server certificate to ensure requests are sent to the intended server. If the ServerCertificateValidationCallback always returns \u0027true\u0027, any certificate will pass validation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5360",
+ "title": "Do Not Call Dangerous Methods In Deserialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5360",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict a Denial-of-Service (DoS) attack, or even execute arbitrary code upon it being deserialized. It\u2019s frequently possible for malicious users to abuse these deserialization features when the application is deserializing untrusted data which is under their control. Specifically, invoke dangerous methods in the process of deserialization. Successful insecure deserialization attacks could allow an attacker to carry out attacks such as DoS attacks, authentication bypasses, and remote code execution.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5360",
+ "title": "Do Not Call Dangerous Methods In Deserialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5360",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict a Denial-of-Service (DoS) attack, or even execute arbitrary code upon it being deserialized. It\u2019s frequently possible for malicious users to abuse these deserialization features when the application is deserializing untrusted data which is under their control. Specifically, invoke dangerous methods in the process of deserialization. Successful insecure deserialization attacks could allow an attacker to carry out attacks such as DoS attacks, authentication bypasses, and remote code execution.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5361",
+ "title": "Do Not Disable SChannel Use of Strong Crypto",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5361",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Starting with the .NET Framework 4.6, the System.Net.ServicePointManager and System.Net.Security.SslStream classes are recommended to use new protocols. The old ones have protocol weaknesses and are not supported. Setting Switch.System.Net.DontEnableSchUseStrongCrypto with true will use the old weak crypto check and opt out of the protocol migration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5361",
+ "title": "Do Not Disable SChannel Use of Strong Crypto",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5361",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Starting with the .NET Framework 4.6, the System.Net.ServicePointManager and System.Net.Security.SslStream classes are recommended to use new protocols. The old ones have protocol weaknesses and are not supported. Setting Switch.System.Net.DontEnableSchUseStrongCrypto with true will use the old weak crypto check and opt out of the protocol migration.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5362",
+ "title": "Potential reference cycle in deserialized object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5362",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Review code that processes untrusted deserialized data for handling of unexpected reference cycles. An unexpected reference cycle should not cause the code to enter an infinite loop. Otherwise, an unexpected reference cycle can allow an attacker to DOS or exhaust the memory of the process when deserializing untrusted data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5362",
+ "title": "Potential reference cycle in deserialized object graph",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5362",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Review code that processes untrusted deserialized data for handling of unexpected reference cycles. An unexpected reference cycle should not cause the code to enter an infinite loop. Otherwise, an unexpected reference cycle can allow an attacker to DOS or exhaust the memory of the process when deserializing untrusted data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5363",
+ "title": "Do Not Disable Request Validation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5363",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Request validation is a feature in ASP.NET that examines HTTP requests and determines whether they contain potentially dangerous content. This check adds protection from markup or code in the URL query string, cookies, or posted form values that might have been added for malicious purposes. So, it is generally desirable and should be left enabled for defense in depth.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5363",
+ "title": "Do Not Disable Request Validation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5363",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Request validation is a feature in ASP.NET that examines HTTP requests and determines whether they contain potentially dangerous content. This check adds protection from markup or code in the URL query string, cookies, or posted form values that might have been added for malicious purposes. So, it is generally desirable and should be left enabled for defense in depth.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5364",
+ "title": "Do Not Use Deprecated Security Protocols",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5364",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using a deprecated security protocol rather than the system default is risky.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5364",
+ "title": "Do Not Use Deprecated Security Protocols",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5364",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Using a deprecated security protocol rather than the system default is risky.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5365",
+ "title": "Do Not Disable HTTP Header Checking",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5365",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "HTTP header checking enables encoding of the carriage return and newline characters, \\r and \\n, that are found in response headers. This encoding can help to avoid injection attacks that exploit an application that echoes untrusted data contained by the header.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5365",
+ "title": "Do Not Disable HTTP Header Checking",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5365",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "HTTP header checking enables encoding of the carriage return and newline characters, \\r and \\n, that are found in response headers. This encoding can help to avoid injection attacks that exploit an application that echoes untrusted data contained by the header.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5366",
+ "title": "Use XmlReader for \u0027DataSet.ReadXml()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5366",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5366",
+ "title": "Use XmlReader for \u0027DataSet.ReadXml()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5366",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5367",
+ "title": "Do Not Serialize Types With Pointer Fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5367",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Pointers are not \u0022type safe\u0022 in the sense that you cannot guarantee the correctness of the memory they point at. So, serializing types with pointer fields is dangerous, as it may allow an attacker to control the pointer.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5367",
+ "title": "Do Not Serialize Types With Pointer Fields",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5367",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Pointers are not \u0022type safe\u0022 in the sense that you cannot guarantee the correctness of the memory they point at. So, serializing types with pointer fields is dangerous, as it may allow an attacker to control the pointer.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5368",
+ "title": "Set ViewStateUserKey For Classes Derived From Page",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5368",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Setting the ViewStateUserKey property can help you prevent attacks on your application by allowing you to assign an identifier to the view-state variable for individual users so that they cannot use the variable to generate an attack. Otherwise, there will be cross-site request forgery vulnerabilities.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5368",
+ "title": "Set ViewStateUserKey For Classes Derived From Page",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5368",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Setting the ViewStateUserKey property can help you prevent attacks on your application by allowing you to assign an identifier to the view-state variable for individual users so that they cannot use the variable to generate an attack. Otherwise, there will be cross-site request forgery vulnerabilities.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5369",
+ "title": "Use XmlReader for \u0027XmlSerializer.Deserialize()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5369",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5369",
+ "title": "Use XmlReader for \u0027XmlSerializer.Deserialize()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5369",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5370",
+ "title": "Use XmlReader for XmlValidatingReader constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5370",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5370",
+ "title": "Use XmlReader for XmlValidatingReader constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5370",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5371",
+ "title": "Use XmlReader for \u0027XmlSchema.Read()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5371",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5371",
+ "title": "Use XmlReader for \u0027XmlSchema.Read()\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5371",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5372",
+ "title": "Use XmlReader for XPathDocument constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5372",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5372",
+ "title": "Use XmlReader for XPathDocument constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5372",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Processing XML from untrusted data may load dangerous external references, which should be restricted by using an XmlReader with a secure resolver or with DTD processing disabled.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5373",
+ "title": "Do not use obsolete key derivation function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5373",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Password-based key derivation should use PBKDF2 with SHA-2. Avoid using PasswordDeriveBytes since it generates a PBKDF1 key. Avoid using Rfc2898DeriveBytes.CryptDeriveKey since it doesn\u0027t use the iteration count or salt.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5373",
+ "title": "Do not use obsolete key derivation function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5373",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Password-based key derivation should use PBKDF2 with SHA-2. Avoid using PasswordDeriveBytes since it generates a PBKDF1 key. Avoid using Rfc2898DeriveBytes.CryptDeriveKey since it doesn\u0027t use the iteration count or salt.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5374",
+ "title": "Do Not Use XslTransform",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5374",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5374",
+ "title": "Do Not Use XslTransform",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5374",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5375",
+ "title": "Do Not Use Account Shared Access Signature",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5375",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Shared Access Signatures(SAS) are a vital part of the security model for any application using Azure Storage, they should provide limited and safe permissions to your storage account to clients that don\u0027t have the account key. All of the operations available via a service SAS are also available via an account SAS, that is, account SAS is too powerful. So it is recommended to use Service SAS to delegate access more carefully.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5375",
+ "title": "Do Not Use Account Shared Access Signature",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5375",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Shared Access Signatures(SAS) are a vital part of the security model for any application using Azure Storage, they should provide limited and safe permissions to your storage account to clients that don\u0027t have the account key. All of the operations available via a service SAS are also available via an account SAS, that is, account SAS is too powerful. So it is recommended to use Service SAS to delegate access more carefully.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5376",
+ "title": "Use SharedAccessProtocol HttpsOnly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5376",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "HTTPS encrypts network traffic. Use HttpsOnly, rather than HttpOrHttps, to ensure network traffic is always encrypted to help prevent disclosure of sensitive data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5376",
+ "title": "Use SharedAccessProtocol HttpsOnly",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5376",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "HTTPS encrypts network traffic. Use HttpsOnly, rather than HttpOrHttps, to ensure network traffic is always encrypted to help prevent disclosure of sensitive data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5377",
+ "title": "Use Container Level Access Policy",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5377",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "No access policy identifier is specified, making tokens non-revocable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5377",
+ "title": "Use Container Level Access Policy",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5377",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "No access policy identifier is specified, making tokens non-revocable.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5378",
+ "title": "Do not disable ServicePointManagerSecurityProtocols",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5378",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5378",
+ "title": "Do not disable ServicePointManagerSecurityProtocols",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5378",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5379",
+ "title": "Ensure Key Derivation Function algorithm is sufficiently strong",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5379",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Some implementations of the Rfc2898DeriveBytes class allow for a hash algorithm to be specified in a constructor parameter or overwritten in the HashAlgorithm property. If a hash algorithm is specified, then it should be SHA-256 or higher.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5379",
+ "title": "Ensure Key Derivation Function algorithm is sufficiently strong",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5379",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Some implementations of the Rfc2898DeriveBytes class allow for a hash algorithm to be specified in a constructor parameter or overwritten in the HashAlgorithm property. If a hash algorithm is specified, then it should be SHA-256 or higher.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5380",
+ "title": "Do Not Add Certificates To Root Store",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5380",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, the Trusted Root Certification Authorities certificate store is configured with a set of public CAs that has met the requirements of the Microsoft Root Certificate Program. Since all trusted root CAs can issue certificates for any domain, an attacker can pick a weak or coercible CA that you install by yourself to target for an attack - and a single vulnerable, malicious or coercible CA undermines the security of the entire system. To make matters worse, these attacks can go unnoticed quite easily.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5380",
+ "title": "Do Not Add Certificates To Root Store",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5380",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, the Trusted Root Certification Authorities certificate store is configured with a set of public CAs that has met the requirements of the Microsoft Root Certificate Program. Since all trusted root CAs can issue certificates for any domain, an attacker can pick a weak or coercible CA that you install by yourself to target for an attack - and a single vulnerable, malicious or coercible CA undermines the security of the entire system. To make matters worse, these attacks can go unnoticed quite easily.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5381",
+ "title": "Ensure Certificates Are Not Added To Root Store",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5381",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, the Trusted Root Certification Authorities certificate store is configured with a set of public CAs that has met the requirements of the Microsoft Root Certificate Program. Since all trusted root CAs can issue certificates for any domain, an attacker can pick a weak or coercible CA that you install by yourself to target for an attack - and a single vulnerable, malicious or coercible CA undermines the security of the entire system. To make matters worse, these attacks can go unnoticed quite easily.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5381",
+ "title": "Ensure Certificates Are Not Added To Root Store",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5381",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, the Trusted Root Certification Authorities certificate store is configured with a set of public CAs that has met the requirements of the Microsoft Root Certificate Program. Since all trusted root CAs can issue certificates for any domain, an attacker can pick a weak or coercible CA that you install by yourself to target for an attack - and a single vulnerable, malicious or coercible CA undermines the security of the entire system. To make matters worse, these attacks can go unnoticed quite easily.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5382",
+ "title": "Use Secure Cookies In ASP.NET Core",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5382",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Applications available over HTTPS must use secure cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5382",
+ "title": "Use Secure Cookies In ASP.NET Core",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5382",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Applications available over HTTPS must use secure cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5383",
+ "title": "Ensure Use Secure Cookies In ASP.NET Core",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5383",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Applications available over HTTPS must use secure cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5383",
+ "title": "Ensure Use Secure Cookies In ASP.NET Core",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5383",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Applications available over HTTPS must use secure cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5384",
+ "title": "Do Not Use Digital Signature Algorithm (DSA)",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5384",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "DSA is too weak to use.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5384",
+ "title": "Do Not Use Digital Signature Algorithm (DSA)",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5384",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "DSA is too weak to use.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5385",
+ "title": "Use Rivest-Shamir-Adleman (RSA) Algorithm With Sufficient Key Size",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5385",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Encryption algorithms are vulnerable to brute force attacks when too small a key size is used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5385",
+ "title": "Use Rivest-Shamir-Adleman (RSA) Algorithm With Sufficient Key Size",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5385",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Encryption algorithms are vulnerable to brute force attacks when too small a key size is used.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5386",
+ "title": "Avoid hardcoding SecurityProtocolType value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5386",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5386",
+ "title": "Avoid hardcoding SecurityProtocolType value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5386",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5387",
+ "title": "Do Not Use Weak Key Derivation Function With Insufficient Iteration Count",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5387",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5387",
+ "title": "Do Not Use Weak Key Derivation Function With Insufficient Iteration Count",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5387",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5388",
+ "title": "Ensure Sufficient Iteration Count When Using Weak Key Derivation Function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5388",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5388",
+ "title": "Ensure Sufficient Iteration Count When Using Weak Key Derivation Function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5388",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When deriving cryptographic keys from user-provided inputs such as password, use sufficient iteration count (at least 100k).",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5389",
+ "title": "Do Not Add Archive Item\u0027s Path To The Target File System Path",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5389",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When extracting files from an archive and using the archive item\u0027s path, check if the path is safe. Archive path can be relative and can lead to file system access outside of the expected file system target path, leading to malicious config changes and remote code execution via lay-and-wait technique.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5389",
+ "title": "Do Not Add Archive Item\u0027s Path To The Target File System Path",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5389",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "When extracting files from an archive and using the archive item\u0027s path, check if the path is safe. Archive path can be relative and can lead to file system access outside of the expected file system target path, leading to malicious config changes and remote code execution via lay-and-wait technique.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5390",
+ "title": "Do not hard-code encryption key",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5390",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "SymmetricAlgorithm\u0027s .Key property, or a method\u0027s rgbKey parameter, should never be a hard-coded value.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5390",
+ "title": "Do not hard-code encryption key",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5390",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "SymmetricAlgorithm\u0027s .Key property, or a method\u0027s rgbKey parameter, should never be a hard-coded value.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5391",
+ "title": "Use antiforgery tokens in ASP.NET Core MVC controllers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5391",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5391",
+ "title": "Use antiforgery tokens in ASP.NET Core MVC controllers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5391",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Handling a POST, PUT, PATCH, or DELETE request without validating an antiforgery token may be vulnerable to cross-site request forgery attacks. A cross-site request forgery attack can send malicious requests from an authenticated user to your ASP.NET Core MVC controller.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5392",
+ "title": "Use DefaultDllImportSearchPaths attribute for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5392",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, P/Invokes using DllImportAttribute probe a number of directories, including the current working directory for the library to load. This can be a security issue for certain applications, leading to DLL hijacking.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5392",
+ "title": "Use DefaultDllImportSearchPaths attribute for P/Invokes",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5392",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By default, P/Invokes using DllImportAttribute probe a number of directories, including the current working directory for the library to load. This can be a security issue for certain applications, leading to DLL hijacking.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5393",
+ "title": "Do not use unsafe DllImportSearchPath value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5393",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "There could be a malicious DLL in the default DLL search directories. Or, depending on where your application is run from, there could be a malicious DLL in the application\u0027s directory. Use a DllImportSearchPath value that specifies an explicit search path instead. The DllImportSearchPath flags that this rule looks for can be configured in .editorconfig.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5393",
+ "title": "Do not use unsafe DllImportSearchPath value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5393",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "There could be a malicious DLL in the default DLL search directories. Or, depending on where your application is run from, there could be a malicious DLL in the application\u0027s directory. Use a DllImportSearchPath value that specifies an explicit search path instead. The DllImportSearchPath flags that this rule looks for can be configured in .editorconfig.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5394",
+ "title": "Do not use insecure randomness",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using a cryptographically weak pseudo-random number generator may allow an attacker to predict what security-sensitive value will be generated. Use a cryptographically strong random number generator if an unpredictable value is required, or ensure that weak pseudo-random numbers aren\u0027t used in a security-sensitive manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5394",
+ "title": "Do not use insecure randomness",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5394",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using a cryptographically weak pseudo-random number generator may allow an attacker to predict what security-sensitive value will be generated. Use a cryptographically strong random number generator if an unpredictable value is required, or ensure that weak pseudo-random numbers aren\u0027t used in a security-sensitive manner.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5395",
+ "title": "Miss HttpVerb attribute for action methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5395",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All the methods that create, edit, delete, or otherwise modify data do so in the [HttpPost] overload of the method, which needs to be protected with the anti forgery attribute from request forgery. Performing a GET operation should be a safe operation that has no side effects and doesn\u0027t modify your persisted data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5395",
+ "title": "Miss HttpVerb attribute for action methods",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5395",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "All the methods that create, edit, delete, or otherwise modify data do so in the [HttpPost] overload of the method, which needs to be protected with the anti forgery attribute from request forgery. Performing a GET operation should be a safe operation that has no side effects and doesn\u0027t modify your persisted data.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5396",
+ "title": "Set HttpOnly to true for HttpCookie",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5396",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "As a defense in depth measure, ensure security sensitive HTTP cookies are marked as HttpOnly. This indicates web browsers should disallow scripts from accessing the cookies. Injected malicious scripts are a common way of stealing cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5396",
+ "title": "Set HttpOnly to true for HttpCookie",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5396",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "As a defense in depth measure, ensure security sensitive HTTP cookies are marked as HttpOnly. This indicates web browsers should disallow scripts from accessing the cookies. Injected malicious scripts are a common way of stealing cookies.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5397",
+ "title": "Do not use deprecated SslProtocols values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5397",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Older protocol versions of Transport Layer Security (TLS) are less secure than TLS 1.2 and TLS 1.3, and are more likely to have new vulnerabilities. Avoid older protocol versions to minimize risk.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5397",
+ "title": "Do not use deprecated SslProtocols values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5397",
+ "category": "Quality",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Older protocol versions of Transport Layer Security (TLS) are less secure than TLS 1.2 and TLS 1.3, and are more likely to have new vulnerabilities. Avoid older protocol versions to minimize risk.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5398",
+ "title": "Avoid hardcoded SslProtocols values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5398",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Current Transport Layer Security protocol versions may become deprecated if vulnerabilities are found. Avoid hardcoding SslProtocols values to keep your application secure. Use \u0027None\u0027 to let the Operating System choose a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5398",
+ "title": "Avoid hardcoded SslProtocols values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5398",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Current Transport Layer Security protocol versions may become deprecated if vulnerabilities are found. Avoid hardcoding SslProtocols values to keep your application secure. Use \u0027None\u0027 to let the Operating System choose a version.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5399",
+ "title": "HttpClients should enable certificate revocation list checks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5399",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using HttpClient without providing a platform specific handler (WinHttpHandler or CurlHandler or HttpClientHandler) where the CheckCertificateRevocationList property is set to true, will allow revoked certificates to be accepted by the HttpClient as valid.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5399",
+ "title": "HttpClients should enable certificate revocation list checks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5399",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using HttpClient without providing a platform specific handler (WinHttpHandler or CurlHandler or HttpClientHandler) where the CheckCertificateRevocationList property is set to true, will allow revoked certificates to be accepted by the HttpClient as valid.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5400",
+ "title": "Ensure HttpClient certificate revocation list check is not disabled",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5400",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using HttpClient without providing a platform specific handler (WinHttpHandler or CurlHandler or HttpClientHandler) where the CheckCertificateRevocationList property is set to true, will allow revoked certificates to be accepted by the HttpClient as valid.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5400",
+ "title": "Ensure HttpClient certificate revocation list check is not disabled",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5400",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Using HttpClient without providing a platform specific handler (WinHttpHandler or CurlHandler or HttpClientHandler) where the CheckCertificateRevocationList property is set to true, will allow revoked certificates to be accepted by the HttpClient as valid.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5401",
+ "title": "Do not use CreateEncryptor with non-default IV",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5401",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Symmetric encryption should always use a non-repeatable initialization vector to prevent dictionary attacks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5401",
+ "title": "Do not use CreateEncryptor with non-default IV",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5401",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Symmetric encryption should always use a non-repeatable initialization vector to prevent dictionary attacks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5402",
+ "title": "Use CreateEncryptor with the default IV",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5402",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Symmetric encryption should always use a non-repeatable initialization vector to prevent dictionary attacks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5402",
+ "title": "Use CreateEncryptor with the default IV",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5402",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Symmetric encryption should always use a non-repeatable initialization vector to prevent dictionary attacks.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5403",
+ "title": "Do not hard-code certificate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5403",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Hard-coded certificates in source code are vulnerable to being exploited.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5403",
+ "title": "Do not hard-code certificate",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5403",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Hard-coded certificates in source code are vulnerable to being exploited.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5404",
+ "title": "Do not disable token validation checks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5404",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Token validation checks ensure that while validating tokens, all aspects are analyzed and verified. Turning off validation can lead to security holes by allowing untrusted tokens to make it through validation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5404",
+ "title": "Do not disable token validation checks",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5404",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Token validation checks ensure that while validating tokens, all aspects are analyzed and verified. Turning off validation can lead to security holes by allowing untrusted tokens to make it through validation.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5405",
+ "title": "Do not always skip token validation in delegates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5405",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By setting critical TokenValidationParameter validation delegates to true, important authentication safeguards are disabled which can lead to tokens from any issuer or expired tokens being wrongly validated.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "CA5405",
+ "title": "Do not always skip token validation in delegates",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/quality-rules/ca5405",
+ "category": "Quality",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "By setting critical TokenValidationParameter validation delegates to true, important authentication safeguards are disabled which can lead to tokens from any issuer or expired tokens being wrongly validated.",
+ "packageId": "Microsoft.CodeAnalysis.NetAnalyzers"
+ },
+ {
+ "id": "EnableGenerateDocumentationFile",
+ "title": "Set MSBuild property \u0027GenerateDocumentationFile\u0027 to \u0027true\u0027",
+ "helpUrl": "https://github.com/dotnet/roslyn/issues/41640",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Add the following PropertyGroup to your MSBuild project file to enable IDE0005 (Remove unnecessary usings/imports) on build:\r\n \u003CPropertyGroup\u003E\r\n \u003C!--\r\n Make sure any documentation comments which are included in code get checked for syntax during the build, but do\r\n not report warnings for missing comments.\r\n CS1573: Parameter \u0027parameter\u0027 has no matching param tag in the XML comment for \u0027parameter\u0027 (but other parameters do)\r\n CS1591: Missing XML comment for publicly visible type or member \u0027Type_or_Member\u0027\r\n CS1712: Type parameter \u0027type_parameter\u0027 has no matching typeparam tag in the XML comment on \u0027type_or_member\u0027 (but other type parameters do)\r\n --\u003E\r\n \u003CGenerateDocumentationFile\u003ETrue\u003C/GenerateDocumentationFile\u003E\r\n \u003CNoWarn\u003E$(NoWarn),1573,1591,1712\u003C/NoWarn\u003E\r\n \u003C/PropertyGroup\u003E\r\n ",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0004",
+ "title": "Remove Unnecessary Cast",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0004",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0005",
+ "title": "Using directive is unnecessary.",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0005",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0005_gen",
+ "title": "Using directive is unnecessary.",
+ "helpUrl": "",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0007",
+ "title": "Use implicit type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0007",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0008",
+ "title": "Use explicit type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0008",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0009",
+ "title": "Member access should be qualified.",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0009",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0010",
+ "title": "Add missing cases",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0010",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0011",
+ "title": "Add braces",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0011",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0016",
+ "title": "Use \u0027throw\u0027 expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0016",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0017",
+ "title": "Simplify object initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0017",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0018",
+ "title": "Inline variable declaration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0018",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0019",
+ "title": "Use pattern matching",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0019",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0020",
+ "title": "Use pattern matching",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0020",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0021",
+ "title": "Use expression body for constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0021",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0022",
+ "title": "Use expression body for method",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0022",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0023",
+ "title": "Use expression body for conversion operator",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0023",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0024",
+ "title": "Use expression body for operator",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0024",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0025",
+ "title": "Use expression body for property",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0025",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0026",
+ "title": "Use expression body for indexer",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0026",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0027",
+ "title": "Use expression body for accessor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0027",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0028",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0028",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0029",
+ "title": "Use coalesce expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0029",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0030",
+ "title": "Use coalesce expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0030",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0031",
+ "title": "Use null propagation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0031",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0032",
+ "title": "Use auto property",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0032",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0033",
+ "title": "Use explicitly provided tuple name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0033",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0034",
+ "title": "Simplify \u0027default\u0027 expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0034",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0035",
+ "title": "Unreachable code detected",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0035",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0036",
+ "title": "Order modifiers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0036",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0037",
+ "title": "Use inferred member name",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0037",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0039",
+ "title": "Use local function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0039",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0040",
+ "title": "Add accessibility modifiers",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0040",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0041",
+ "title": "Use \u0027is null\u0027 check",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0041",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0041",
+ "title": "Use \u0027is null\u0027 check",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0041",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0042",
+ "title": "Deconstruct variable declaration",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0042",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0043",
+ "title": "Invalid format string",
+ "helpUrl": "",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0044",
+ "title": "Add readonly modifier",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0044",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0045",
+ "title": "Convert to conditional expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0045",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0046",
+ "title": "Convert to conditional expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0046",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0047",
+ "title": "Remove unnecessary parentheses",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0047",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0047",
+ "title": "Remove unnecessary parentheses",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0047",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0048",
+ "title": "Add parentheses for clarity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0048",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0048",
+ "title": "Add parentheses for clarity",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0048",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0051",
+ "title": "Remove unused private members",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0051",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0052",
+ "title": "Remove unread private members",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0052",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0053",
+ "title": "Use expression body for lambda expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0053",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0053",
+ "title": "Use block body for lambda expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0053",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0054",
+ "title": "Use compound assignment",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0054",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0055",
+ "title": "Fix formatting",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0055",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0056",
+ "title": "Use index operator",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0056",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0057",
+ "title": "Use range operator",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0057",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0058",
+ "title": "Expression value is never used",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0058",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0059",
+ "title": "Unnecessary assignment of a value",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0059",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Avoid unnecessary value assignments in your code, as these likely indicate redundant value computations. If the value computation is not redundant and you intend to retain the assignment, then change the assignment target to a local variable whose name starts with an underscore and is optionally followed by an integer, such as \u0027_\u0027, \u0027_1\u0027, \u0027_2\u0027, etc. These are treated as special discard symbol names.",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0060",
+ "title": "Remove unused parameter",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0060",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "Avoid unused parameters in your code. If the parameter cannot be removed, then change its name so it starts with an underscore and is optionally followed by an integer, such as \u0027_\u0027, \u0027_1\u0027, \u0027_2\u0027, etc. These are treated as special discard symbol names.",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0061",
+ "title": "Use expression body for local function",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0061",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0062",
+ "title": "Make local function \u0027static\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0062",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0063",
+ "title": "Use simple \u0027using\u0027 statement",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0063",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0064",
+ "title": "Make readonly fields writable",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0064",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0065",
+ "title": "Misplaced using directive",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0065",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0065",
+ "title": "Misplaced using directive",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0065",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0066",
+ "title": "Convert switch statement to expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0066",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0070",
+ "title": "Use \u0027System.HashCode\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0070",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0071",
+ "title": "Simplify interpolation",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0071",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0072",
+ "title": "Add missing cases",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0072",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0073",
+ "title": "The file header does not match the required text",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0073",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0073",
+ "title": "The file header is missing or not located at the top of the file",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0073",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0074",
+ "title": "Use compound assignment",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0074",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0075",
+ "title": "Simplify conditional expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0075",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0076",
+ "title": "Invalid global \u0027SuppressMessageAttribute\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0076",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0076",
+ "title": "Invalid global \u0027SuppressMessageAttribute\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0076",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0077",
+ "title": "Avoid legacy format target in \u0027SuppressMessageAttribute\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0077",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0078",
+ "title": "Use pattern matching",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0078",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0079",
+ "title": "Remove unnecessary suppression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0079",
+ "category": "Style",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0080",
+ "title": "Remove unnecessary suppression operator",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0080",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0082",
+ "title": "\u0027typeof\u0027 can be converted to \u0027nameof\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0082",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0083",
+ "title": "Use pattern matching",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0083",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0090",
+ "title": "Use \u0027new(...)\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0090",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0100",
+ "title": "Remove redundant equality",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0100",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0110",
+ "title": "Remove unnecessary discard",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0110",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0120",
+ "title": "Simplify LINQ expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0120",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0121",
+ "title": "Simplify LINQ expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0121",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0130",
+ "title": "Namespace does not match folder structure",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0130",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0150",
+ "title": "Prefer \u0027null\u0027 check over type check",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0150",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0160",
+ "title": "Convert to block scoped namespace",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0160",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0161",
+ "title": "Convert to file-scoped namespace",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0161",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0170",
+ "title": "Property pattern can be simplified",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0170",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0180",
+ "title": "Use tuple to swap values",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0180",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0200",
+ "title": "Remove unnecessary lambda expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0200",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0210",
+ "title": "Convert to top-level statements",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0210",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0211",
+ "title": "Convert to \u0027Program.Main\u0027 style program",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0211",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0220",
+ "title": "Add explicit cast",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0220",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0230",
+ "title": "Use UTF-8 string literal",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0230",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0240",
+ "title": "Remove redundant nullable directive",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0240",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0241",
+ "title": "Remove unnecessary nullable directive",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0241",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0250",
+ "title": "Make struct \u0027readonly\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0250",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0251",
+ "title": "Make member \u0027readonly\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0251",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0260",
+ "title": "Use pattern matching",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0260",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0270",
+ "title": "Use coalesce expression",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0270",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0280",
+ "title": "Use \u0027nameof\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0280",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0290",
+ "title": "Use primary constructor",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0290",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0300",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0300",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0301",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0301",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0302",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0302",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0303",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0303",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0304",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0304",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0305",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0305",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0306",
+ "title": "Simplify collection initialization",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0306",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0320",
+ "title": "Make anonymous function static",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0320",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0330",
+ "title": "Use \u0027System.Threading.Lock\u0027",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0330",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0340",
+ "title": "Use unbound generic type",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0340",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE0350",
+ "title": "Use implicitly typed lambda",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide0350",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE1005",
+ "title": "Delegate invocation can be simplified.",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide1005",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE1006",
+ "title": "Naming Styles",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide1006",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2000",
+ "title": "Avoid multiple blank lines",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2000",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2001",
+ "title": "Embedded statements must be on their own line",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2001",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2002",
+ "title": "Consecutive braces must not have blank line between them",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2002",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2003",
+ "title": "Blank line required between block and subsequent statement",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2003",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2004",
+ "title": "Blank line not allowed after constructor initializer colon",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2004",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2005",
+ "title": "Blank line not allowed after conditional expression token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2005",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "IDE2006",
+ "title": "Blank line not allowed after arrow expression clause token",
+ "helpUrl": "https://learn.microsoft.com/dotnet/fundamentals/code-analysis/style-rules/ide2006",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "MA0001",
+ "title": "StringComparison is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0001.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0001",
+ "title": "StringComparison is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0001.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0001",
+ "title": "StringComparison is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0001.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0001",
+ "title": "StringComparison is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0001.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0001",
+ "title": "StringComparison is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0001.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0002",
+ "title": "IEqualityComparer\u003Cstring\u003E or IComparer\u003Cstring\u003E is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0002.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0002",
+ "title": "IEqualityComparer\u003Cstring\u003E or IComparer\u003Cstring\u003E is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0002.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0002",
+ "title": "IEqualityComparer\u003Cstring\u003E or IComparer\u003Cstring\u003E is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0002.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0002",
+ "title": "IEqualityComparer\u003Cstring\u003E or IComparer\u003Cstring\u003E is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0002.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0002",
+ "title": "IEqualityComparer\u003Cstring\u003E or IComparer\u003Cstring\u003E is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0002.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0003",
+ "title": "Add parameter name to improve readability",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0003.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0003",
+ "title": "Add parameter name to improve readability",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0003.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0003",
+ "title": "Add parameter name to improve readability",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0003.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0003",
+ "title": "Add parameter name to improve readability",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0003.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0003",
+ "title": "Add parameter name to improve readability",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0003.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0004",
+ "title": "Use Task.ConfigureAwait",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0004.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0004",
+ "title": "Use Task.ConfigureAwait",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0004.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0004",
+ "title": "Use Task.ConfigureAwait",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0004.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0004",
+ "title": "Use Task.ConfigureAwait",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0004.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0004",
+ "title": "Use Task.ConfigureAwait",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0004.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0005",
+ "title": "Use Array.Empty\u003CT\u003E()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0005.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0005",
+ "title": "Use Array.Empty\u003CT\u003E()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0005.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0005",
+ "title": "Use Array.Empty\u003CT\u003E()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0005.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0005",
+ "title": "Use Array.Empty\u003CT\u003E()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0005.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0005",
+ "title": "Use Array.Empty\u003CT\u003E()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0005.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0006",
+ "title": "Use String.Equals instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0006.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0006",
+ "title": "Use String.Equals instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0006.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0006",
+ "title": "Use String.Equals instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0006.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0006",
+ "title": "Use String.Equals instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0006.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0006",
+ "title": "Use String.Equals instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0006.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0007",
+ "title": "Add a comma after the last value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0007.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0007",
+ "title": "Add a comma after the last value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0007.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0007",
+ "title": "Add a comma after the last value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0007.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0007",
+ "title": "Add a comma after the last value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0007.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0007",
+ "title": "Add a comma after the last value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0007.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0008",
+ "title": "Add StructLayoutAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0008.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0008",
+ "title": "Add StructLayoutAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0008.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0008",
+ "title": "Add StructLayoutAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0008.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0008",
+ "title": "Add StructLayoutAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0008.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0008",
+ "title": "Add StructLayoutAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0008.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0009",
+ "title": "Add regex evaluation timeout",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0009.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0010",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0010.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0010",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0010.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0010",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0010.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0010",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0010.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0010",
+ "title": "Mark attributes with AttributeUsageAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0010.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0011",
+ "title": "IFormatProvider is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0011.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0011",
+ "title": "IFormatProvider is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0011.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0011",
+ "title": "IFormatProvider is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0011.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0011",
+ "title": "IFormatProvider is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0011.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0011",
+ "title": "IFormatProvider is missing",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0011.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0012",
+ "title": "Do not raise reserved exception type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0012.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0012",
+ "title": "Do not raise reserved exception type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0012.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0012",
+ "title": "Do not raise reserved exception type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0012.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0012",
+ "title": "Do not raise reserved exception type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0012.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0012",
+ "title": "Do not raise reserved exception type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0012.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0013",
+ "title": "Types should not extend System.ApplicationException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0013.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0013",
+ "title": "Types should not extend System.ApplicationException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0013.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0013",
+ "title": "Types should not extend System.ApplicationException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0013.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0013",
+ "title": "Types should not extend System.ApplicationException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0013.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0013",
+ "title": "Types should not extend System.ApplicationException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0013.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0014",
+ "title": "Do not raise System.ApplicationException type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0014.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0014",
+ "title": "Do not raise System.ApplicationException type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0014.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0014",
+ "title": "Do not raise System.ApplicationException type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0014.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0014",
+ "title": "Do not raise System.ApplicationException type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0014.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0014",
+ "title": "Do not raise System.ApplicationException type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0014.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0015",
+ "title": "Specify the parameter name in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0015.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0015",
+ "title": "Specify the parameter name in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0015.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0015",
+ "title": "Specify the parameter name in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0015.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0015",
+ "title": "Specify the parameter name in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0015.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0015",
+ "title": "Specify the parameter name in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0015.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0016",
+ "title": "Prefer using collection abstraction instead of implementation",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0016.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0016",
+ "title": "Prefer using collection abstraction instead of implementation",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0016.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0016",
+ "title": "Prefer using collection abstraction instead of implementation",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0016.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0016",
+ "title": "Prefer using collection abstraction instead of implementation",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0016.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0016",
+ "title": "Prefer using collection abstraction instead of implementation",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0016.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0017",
+ "title": "Abstract types should not have public or internal constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0017.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0017",
+ "title": "Abstract types should not have public or internal constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0017.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0017",
+ "title": "Abstract types should not have public or internal constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0017.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0017",
+ "title": "Abstract types should not have public or internal constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0017.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0017",
+ "title": "Abstract types should not have public or internal constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0017.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0018",
+ "title": "Do not declare static members on generic types (deprecated; use CA1000 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0018.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0018",
+ "title": "Do not declare static members on generic types (deprecated; use CA1000 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0018.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0018",
+ "title": "Do not declare static members on generic types (deprecated; use CA1000 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0018.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0018",
+ "title": "Do not declare static members on generic types (deprecated; use CA1000 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0018.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0018",
+ "title": "Do not declare static members on generic types (deprecated; use CA1000 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0018.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0019",
+ "title": "Use EventArgs.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0019.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0019",
+ "title": "Use EventArgs.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0019.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0019",
+ "title": "Use EventArgs.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0019.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0019",
+ "title": "Use EventArgs.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0019.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0019",
+ "title": "Use EventArgs.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0019.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0020",
+ "title": "Use direct methods instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0020.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0020",
+ "title": "Use direct methods instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0020.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0020",
+ "title": "Use direct methods instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0020.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0020",
+ "title": "Use direct methods instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0020.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0020",
+ "title": "Use direct methods instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0020.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0021",
+ "title": "Use StringComparer.GetHashCode instead of string.GetHashCode",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0021.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0021",
+ "title": "Use StringComparer.GetHashCode instead of string.GetHashCode",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0021.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0021",
+ "title": "Use StringComparer.GetHashCode instead of string.GetHashCode",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0021.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0021",
+ "title": "Use StringComparer.GetHashCode instead of string.GetHashCode",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0021.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0021",
+ "title": "Use StringComparer.GetHashCode instead of string.GetHashCode",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0021.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0022",
+ "title": "Return Task.FromResult instead of returning null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0022.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0022",
+ "title": "Return Task.FromResult instead of returning null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0022.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0022",
+ "title": "Return Task.FromResult instead of returning null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0022.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0022",
+ "title": "Return Task.FromResult instead of returning null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0022.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0022",
+ "title": "Return Task.FromResult instead of returning null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0022.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0023",
+ "title": "Add RegexOptions.ExplicitCapture",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0023.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0024",
+ "title": "Use an explicit StringComparer when possible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0024.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0024",
+ "title": "Use an explicit StringComparer when possible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0024.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0024",
+ "title": "Use an explicit StringComparer when possible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0024.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0024",
+ "title": "Use an explicit StringComparer when possible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0024.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0024",
+ "title": "Use an explicit StringComparer when possible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0024.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0025",
+ "title": "Implement the functionality instead of throwing NotImplementedException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0025.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0025",
+ "title": "Implement the functionality instead of throwing NotImplementedException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0025.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0025",
+ "title": "Implement the functionality instead of throwing NotImplementedException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0025.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0025",
+ "title": "Implement the functionality instead of throwing NotImplementedException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0025.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0025",
+ "title": "Implement the functionality instead of throwing NotImplementedException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0025.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0026",
+ "title": "Fix TODO comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0026.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0026",
+ "title": "Fix TODO comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0026.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0026",
+ "title": "Fix TODO comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0026.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0026",
+ "title": "Fix TODO comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0026.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0026",
+ "title": "Fix TODO comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0026.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0027",
+ "title": "Prefer rethrowing an exception implicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0027.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0027",
+ "title": "Prefer rethrowing an exception implicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0027.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0027",
+ "title": "Prefer rethrowing an exception implicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0027.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0027",
+ "title": "Prefer rethrowing an exception implicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0027.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0027",
+ "title": "Prefer rethrowing an exception implicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0027.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0028",
+ "title": "Optimize StringBuilder usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0028.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0028",
+ "title": "Optimize StringBuilder usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0028.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0028",
+ "title": "Optimize StringBuilder usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0028.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0028",
+ "title": "Optimize StringBuilder usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0028.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0028",
+ "title": "Optimize StringBuilder usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0028.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0029",
+ "title": "Combine LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0029.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0029",
+ "title": "Combine LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0029.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0029",
+ "title": "Combine LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0029.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0029",
+ "title": "Combine LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0029.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0029",
+ "title": "Combine LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0029.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0030",
+ "title": "Remove useless OrderBy call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0030.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0030",
+ "title": "Remove useless OrderBy call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0030.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0030",
+ "title": "Remove useless OrderBy call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0030.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0030",
+ "title": "Remove useless OrderBy call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0030.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0030",
+ "title": "Remove useless OrderBy call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0030.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0031",
+ "title": "Optimize Enumerable.Count() usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0031.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0031",
+ "title": "Optimize Enumerable.Count() usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0031.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0031",
+ "title": "Optimize Enumerable.Count() usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0031.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0031",
+ "title": "Optimize Enumerable.Count() usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0031.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0031",
+ "title": "Optimize Enumerable.Count() usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0031.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0032",
+ "title": "Use an overload with a CancellationToken argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0032.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0032",
+ "title": "Use an overload with a CancellationToken argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0032.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0032",
+ "title": "Use an overload with a CancellationToken argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0032.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0032",
+ "title": "Use an overload with a CancellationToken argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0032.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0032",
+ "title": "Use an overload with a CancellationToken argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0032.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0033",
+ "title": "Do not tag instance fields with ThreadStaticAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0033.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0033",
+ "title": "Do not tag instance fields with ThreadStaticAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0033.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0033",
+ "title": "Do not tag instance fields with ThreadStaticAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0033.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0033",
+ "title": "Do not tag instance fields with ThreadStaticAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0033.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0033",
+ "title": "Do not tag instance fields with ThreadStaticAttribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0033.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0035",
+ "title": "Do not use dangerous threading methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0035.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0035",
+ "title": "Do not use dangerous threading methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0035.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0035",
+ "title": "Do not use dangerous threading methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0035.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0035",
+ "title": "Do not use dangerous threading methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0035.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0035",
+ "title": "Do not use dangerous threading methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0035.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0036",
+ "title": "Make class static",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0036.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0036",
+ "title": "Make class static",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0036.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0036",
+ "title": "Make class static",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0036.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0036",
+ "title": "Make class static",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0036.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0036",
+ "title": "Make class static",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0036.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0037",
+ "title": "Remove empty statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0037.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0037",
+ "title": "Remove empty statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0037.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0037",
+ "title": "Remove empty statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0037.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0037",
+ "title": "Remove empty statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0037.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0037",
+ "title": "Remove empty statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0037.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0038",
+ "title": "Make method static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0038.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0038",
+ "title": "Make method static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0038.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0038",
+ "title": "Make method static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0038.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0038",
+ "title": "Make method static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0038.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0038",
+ "title": "Make method static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0038.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0039",
+ "title": "Do not write your own certificate validation method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0039.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0039",
+ "title": "Do not write your own certificate validation method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0039.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0039",
+ "title": "Do not write your own certificate validation method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0039.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0039",
+ "title": "Do not write your own certificate validation method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0039.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0039",
+ "title": "Do not write your own certificate validation method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0039.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0040",
+ "title": "Forward the CancellationToken parameter to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0040.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0040",
+ "title": "Forward the CancellationToken parameter to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0040.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0040",
+ "title": "Forward the CancellationToken parameter to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0040.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0040",
+ "title": "Forward the CancellationToken parameter to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0040.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0040",
+ "title": "Forward the CancellationToken parameter to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0040.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0041",
+ "title": "Make property static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0041.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0041",
+ "title": "Make property static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0041.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0041",
+ "title": "Make property static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0041.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0041",
+ "title": "Make property static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0041.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0041",
+ "title": "Make property static (deprecated, use CA1822 instead)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0041.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0042",
+ "title": "Do not use blocking calls in an async method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0042.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0042",
+ "title": "Do not use blocking calls in an async method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0042.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0042",
+ "title": "Do not use blocking calls in an async method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0042.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0042",
+ "title": "Do not use blocking calls in an async method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0042.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0042",
+ "title": "Do not use blocking calls in an async method",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0042.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0043",
+ "title": "Use nameof operator in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0043.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0043",
+ "title": "Use nameof operator in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0043.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0043",
+ "title": "Use nameof operator in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0043.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0043",
+ "title": "Use nameof operator in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0043.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0043",
+ "title": "Use nameof operator in ArgumentException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0043.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0044",
+ "title": "Remove useless ToString call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0044.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0044",
+ "title": "Remove useless ToString call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0044.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0044",
+ "title": "Remove useless ToString call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0044.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0044",
+ "title": "Remove useless ToString call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0044.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0044",
+ "title": "Remove useless ToString call",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0044.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0045",
+ "title": "Do not use blocking calls in a sync method (need to make calling method async)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0045.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0045",
+ "title": "Do not use blocking calls in a sync method (need to make calling method async)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0045.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0045",
+ "title": "Do not use blocking calls in a sync method (need to make calling method async)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0045.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0045",
+ "title": "Do not use blocking calls in a sync method (need to make calling method async)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0045.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0045",
+ "title": "Do not use blocking calls in a sync method (need to make calling method async)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0045.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0046",
+ "title": "Use EventHandler\u003CT\u003E to declare events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0046.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0046",
+ "title": "Use EventHandler\u003CT\u003E to declare events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0046.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0046",
+ "title": "Use EventHandler\u003CT\u003E to declare events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0046.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0046",
+ "title": "Use EventHandler\u003CT\u003E to declare events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0046.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0046",
+ "title": "Use EventHandler\u003CT\u003E to declare events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0046.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0047",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0047.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0047",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0047.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0047",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0047.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0047",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0047.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0047",
+ "title": "Declare types in namespaces",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0047.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0048",
+ "title": "File name must match type name",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0048.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0048",
+ "title": "File name must match type name",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0048.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0048",
+ "title": "File name must match type name",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0048.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0048",
+ "title": "File name must match type name",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0048.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0048",
+ "title": "File name must match type name",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0048.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0049",
+ "title": "Type name should not match containing namespace",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0049.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0049",
+ "title": "Type name should not match containing namespace",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0049.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0049",
+ "title": "Type name should not match containing namespace",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0049.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0049",
+ "title": "Type name should not match containing namespace",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0049.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0049",
+ "title": "Type name should not match containing namespace",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0049.md",
+ "category": "Other",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0050",
+ "title": "Validate arguments correctly in iterator methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0050.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0050",
+ "title": "Validate arguments correctly in iterator methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0050.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0050",
+ "title": "Validate arguments correctly in iterator methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0050.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0050",
+ "title": "Validate arguments correctly in iterator methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0050.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0050",
+ "title": "Validate arguments correctly in iterator methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0050.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0051",
+ "title": "Method is too long",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0051.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0051",
+ "title": "Method is too long",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0051.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0051",
+ "title": "Method is too long",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0051.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0051",
+ "title": "Method is too long",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0051.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0051",
+ "title": "Method is too long",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0051.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0052",
+ "title": "Replace constant Enum.ToString with nameof",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0052.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0052",
+ "title": "Replace constant Enum.ToString with nameof",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0052.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0052",
+ "title": "Replace constant Enum.ToString with nameof",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0052.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0052",
+ "title": "Replace constant Enum.ToString with nameof",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0052.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0052",
+ "title": "Replace constant Enum.ToString with nameof",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0052.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0053",
+ "title": "Make class sealed",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0053.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0053",
+ "title": "Make class sealed",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0053.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0053",
+ "title": "Make class sealed",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0053.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0053",
+ "title": "Make class sealed",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0053.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0053",
+ "title": "Make class sealed",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0053.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0054",
+ "title": "Embed the caught exception as innerException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0054.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0054",
+ "title": "Embed the caught exception as innerException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0054.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0054",
+ "title": "Embed the caught exception as innerException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0054.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0054",
+ "title": "Embed the caught exception as innerException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0054.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0054",
+ "title": "Embed the caught exception as innerException",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0054.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0055",
+ "title": "Do not use finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0055.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0055",
+ "title": "Do not use finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0055.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0055",
+ "title": "Do not use finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0055.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0055",
+ "title": "Do not use finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0055.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0055",
+ "title": "Do not use finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0055.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0056",
+ "title": "Do not call overridable members in constructor",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0056.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0056",
+ "title": "Do not call overridable members in constructor",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0056.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0056",
+ "title": "Do not call overridable members in constructor",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0056.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0056",
+ "title": "Do not call overridable members in constructor",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0056.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0056",
+ "title": "Do not call overridable members in constructor",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0056.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0057",
+ "title": "Class name should end with \u0027Attribute\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0057.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0057",
+ "title": "Class name should end with \u0027Attribute\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0057.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0057",
+ "title": "Class name should end with \u0027Attribute\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0057.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0057",
+ "title": "Class name should end with \u0027Attribute\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0057.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0057",
+ "title": "Class name should end with \u0027Attribute\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0057.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0058",
+ "title": "Class name should end with \u0027Exception\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0058.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0058",
+ "title": "Class name should end with \u0027Exception\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0058.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0058",
+ "title": "Class name should end with \u0027Exception\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0058.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0058",
+ "title": "Class name should end with \u0027Exception\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0058.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0058",
+ "title": "Class name should end with \u0027Exception\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0058.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0059",
+ "title": "Class name should end with \u0027EventArgs\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0059.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0059",
+ "title": "Class name should end with \u0027EventArgs\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0059.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0059",
+ "title": "Class name should end with \u0027EventArgs\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0059.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0059",
+ "title": "Class name should end with \u0027EventArgs\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0059.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0059",
+ "title": "Class name should end with \u0027EventArgs\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0059.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0060",
+ "title": "The value returned by Stream.Read/Stream.ReadAsync is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0060.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0060",
+ "title": "The value returned by Stream.Read/Stream.ReadAsync is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0060.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0060",
+ "title": "The value returned by Stream.Read/Stream.ReadAsync is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0060.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0060",
+ "title": "The value returned by Stream.Read/Stream.ReadAsync is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0060.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0060",
+ "title": "The value returned by Stream.Read/Stream.ReadAsync is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0060.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0061",
+ "title": "Method overrides should not change default values",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0061.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0061",
+ "title": "Method overrides should not change default values",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0061.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0061",
+ "title": "Method overrides should not change default values",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0061.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0061",
+ "title": "Method overrides should not change default values",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0061.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0061",
+ "title": "Method overrides should not change default values",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0061.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0062",
+ "title": "Non-flags enums should not be marked with \u0022FlagsAttribute\u0022",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0062.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0062",
+ "title": "Non-flags enums should not be marked with \u0022FlagsAttribute\u0022",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0062.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0062",
+ "title": "Non-flags enums should not be marked with \u0022FlagsAttribute\u0022",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0062.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0062",
+ "title": "Non-flags enums should not be marked with \u0022FlagsAttribute\u0022",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0062.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0062",
+ "title": "Non-flags enums should not be marked with \u0022FlagsAttribute\u0022",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0062.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0063",
+ "title": "Use Where before OrderBy",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0063.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0063",
+ "title": "Use Where before OrderBy",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0063.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0063",
+ "title": "Use Where before OrderBy",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0063.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0063",
+ "title": "Use Where before OrderBy",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0063.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0063",
+ "title": "Use Where before OrderBy",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0063.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0064",
+ "title": "Avoid locking on publicly accessible instance",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0064.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0064",
+ "title": "Avoid locking on publicly accessible instance",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0064.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0064",
+ "title": "Avoid locking on publicly accessible instance",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0064.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0064",
+ "title": "Avoid locking on publicly accessible instance",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0064.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0064",
+ "title": "Avoid locking on publicly accessible instance",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0064.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0065",
+ "title": "Default ValueType.Equals or HashCode is used for struct equality",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0065.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0065",
+ "title": "Default ValueType.Equals or HashCode is used for struct equality",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0065.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0065",
+ "title": "Default ValueType.Equals or HashCode is used for struct equality",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0065.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0065",
+ "title": "Default ValueType.Equals or HashCode is used for struct equality",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0065.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0065",
+ "title": "Default ValueType.Equals or HashCode is used for struct equality",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0065.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0066",
+ "title": "Hash table unfriendly type is used in a hash table",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0066.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0066",
+ "title": "Hash table unfriendly type is used in a hash table",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0066.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0066",
+ "title": "Hash table unfriendly type is used in a hash table",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0066.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0066",
+ "title": "Hash table unfriendly type is used in a hash table",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0066.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0066",
+ "title": "Hash table unfriendly type is used in a hash table",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0066.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0067",
+ "title": "Use Guid.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0067.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0067",
+ "title": "Use Guid.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0067.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0067",
+ "title": "Use Guid.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0067.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0067",
+ "title": "Use Guid.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0067.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0067",
+ "title": "Use Guid.Empty",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0067.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0068",
+ "title": "Invalid parameter name for nullable attribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0068.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0068",
+ "title": "Invalid parameter name for nullable attribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0068.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0068",
+ "title": "Invalid parameter name for nullable attribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0068.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0068",
+ "title": "Invalid parameter name for nullable attribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0068.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0068",
+ "title": "Invalid parameter name for nullable attribute",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0068.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0069",
+ "title": "Non-constant static fields should not be visible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0069.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0069",
+ "title": "Non-constant static fields should not be visible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0069.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0069",
+ "title": "Non-constant static fields should not be visible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0069.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0069",
+ "title": "Non-constant static fields should not be visible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0069.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0069",
+ "title": "Non-constant static fields should not be visible",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0069.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0070",
+ "title": "Obsolete attributes should include explanations",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0070.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0070",
+ "title": "Obsolete attributes should include explanations",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0070.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0070",
+ "title": "Obsolete attributes should include explanations",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0070.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0070",
+ "title": "Obsolete attributes should include explanations",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0070.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0070",
+ "title": "Obsolete attributes should include explanations",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0070.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0071",
+ "title": "Avoid using redundant else",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0071.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The \u0027if\u0027 block contains a jump statement (break, continue, goto, return, throw, yield break). Using \u0027else\u0027 is redundant and needlessly maintains a higher nesting level.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0071",
+ "title": "Avoid using redundant else",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0071.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The \u0027if\u0027 block contains a jump statement (break, continue, goto, return, throw, yield break). Using \u0027else\u0027 is redundant and needlessly maintains a higher nesting level.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0071",
+ "title": "Avoid using redundant else",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0071.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The \u0027if\u0027 block contains a jump statement (break, continue, goto, return, throw, yield break). Using \u0027else\u0027 is redundant and needlessly maintains a higher nesting level.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0071",
+ "title": "Avoid using redundant else",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0071.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The \u0027if\u0027 block contains a jump statement (break, continue, goto, return, throw, yield break). Using \u0027else\u0027 is redundant and needlessly maintains a higher nesting level.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0071",
+ "title": "Avoid using redundant else",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0071.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "The \u0027if\u0027 block contains a jump statement (break, continue, goto, return, throw, yield break). Using \u0027else\u0027 is redundant and needlessly maintains a higher nesting level.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0072",
+ "title": "Do not throw from a finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0072.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0072",
+ "title": "Do not throw from a finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0072.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0072",
+ "title": "Do not throw from a finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0072.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0072",
+ "title": "Do not throw from a finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0072.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0072",
+ "title": "Do not throw from a finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0072.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0073",
+ "title": "Avoid comparison with bool constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0073.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0073",
+ "title": "Avoid comparison with bool constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0073.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0073",
+ "title": "Avoid comparison with bool constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0073.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0073",
+ "title": "Avoid comparison with bool constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0073.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0073",
+ "title": "Avoid comparison with bool constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0073.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0074",
+ "title": "Avoid implicit culture-sensitive methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0074.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0074",
+ "title": "Avoid implicit culture-sensitive methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0074.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0074",
+ "title": "Avoid implicit culture-sensitive methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0074.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0074",
+ "title": "Avoid implicit culture-sensitive methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0074.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0074",
+ "title": "Avoid implicit culture-sensitive methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0074.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0075",
+ "title": "Do not use implicit culture-sensitive ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0075.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0075",
+ "title": "Do not use implicit culture-sensitive ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0075.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0075",
+ "title": "Do not use implicit culture-sensitive ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0075.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0075",
+ "title": "Do not use implicit culture-sensitive ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0075.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0075",
+ "title": "Do not use implicit culture-sensitive ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0075.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0076",
+ "title": "Do not use implicit culture-sensitive ToString in interpolated strings",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0076.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0076",
+ "title": "Do not use implicit culture-sensitive ToString in interpolated strings",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0076.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0076",
+ "title": "Do not use implicit culture-sensitive ToString in interpolated strings",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0076.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0076",
+ "title": "Do not use implicit culture-sensitive ToString in interpolated strings",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0076.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0076",
+ "title": "Do not use implicit culture-sensitive ToString in interpolated strings",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0076.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0077",
+ "title": "A class that provides Equals(T) should implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0077.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0077",
+ "title": "A class that provides Equals(T) should implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0077.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0077",
+ "title": "A class that provides Equals(T) should implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0077.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0077",
+ "title": "A class that provides Equals(T) should implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0077.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0077",
+ "title": "A class that provides Equals(T) should implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0077.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0078",
+ "title": "Use \u0027Cast\u0027 instead of \u0027Select\u0027 to cast",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0078.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0078",
+ "title": "Use \u0027Cast\u0027 instead of \u0027Select\u0027 to cast",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0078.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0078",
+ "title": "Use \u0027Cast\u0027 instead of \u0027Select\u0027 to cast",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0078.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0078",
+ "title": "Use \u0027Cast\u0027 instead of \u0027Select\u0027 to cast",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0078.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0078",
+ "title": "Use \u0027Cast\u0027 instead of \u0027Select\u0027 to cast",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0078.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0079",
+ "title": "Forward the CancellationToken using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0079.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0079",
+ "title": "Forward the CancellationToken using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0079.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0079",
+ "title": "Forward the CancellationToken using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0079.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0079",
+ "title": "Forward the CancellationToken using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0079.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0079",
+ "title": "Forward the CancellationToken using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0079.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0080",
+ "title": "Use a cancellation token using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0080.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0080",
+ "title": "Use a cancellation token using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0080.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0080",
+ "title": "Use a cancellation token using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0080.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0080",
+ "title": "Use a cancellation token using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0080.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0080",
+ "title": "Use a cancellation token using .WithCancellation()",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0080.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0081",
+ "title": "Method overrides should not omit params keyword",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0081.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0081",
+ "title": "Method overrides should not omit params keyword",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0081.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0081",
+ "title": "Method overrides should not omit params keyword",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0081.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0081",
+ "title": "Method overrides should not omit params keyword",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0081.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0081",
+ "title": "Method overrides should not omit params keyword",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0081.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0082",
+ "title": "NaN should not be used in comparisons",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0082.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0082",
+ "title": "NaN should not be used in comparisons",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0082.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0082",
+ "title": "NaN should not be used in comparisons",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0082.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0082",
+ "title": "NaN should not be used in comparisons",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0082.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0082",
+ "title": "NaN should not be used in comparisons",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0082.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0083",
+ "title": "ConstructorArgument parameters should exist in constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0083.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0083",
+ "title": "ConstructorArgument parameters should exist in constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0083.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0083",
+ "title": "ConstructorArgument parameters should exist in constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0083.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0083",
+ "title": "ConstructorArgument parameters should exist in constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0083.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0083",
+ "title": "ConstructorArgument parameters should exist in constructors",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0083.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0084",
+ "title": "Local variables should not hide other symbols",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0084.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0084",
+ "title": "Local variables should not hide other symbols",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0084.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0084",
+ "title": "Local variables should not hide other symbols",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0084.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0084",
+ "title": "Local variables should not hide other symbols",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0084.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0084",
+ "title": "Local variables should not hide other symbols",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0084.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0085",
+ "title": "Anonymous delegates should not be used to unsubscribe from Events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0085.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0085",
+ "title": "Anonymous delegates should not be used to unsubscribe from Events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0085.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0085",
+ "title": "Anonymous delegates should not be used to unsubscribe from Events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0085.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0085",
+ "title": "Anonymous delegates should not be used to unsubscribe from Events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0085.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0085",
+ "title": "Anonymous delegates should not be used to unsubscribe from Events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0085.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0086",
+ "title": "Do not throw from a finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0086.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0086",
+ "title": "Do not throw from a finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0086.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0086",
+ "title": "Do not throw from a finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0086.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0086",
+ "title": "Do not throw from a finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0086.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0086",
+ "title": "Do not throw from a finalizer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0086.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0087",
+ "title": "Parameters with [DefaultParameterValue] attributes should also be marked [Optional]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0087.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0087",
+ "title": "Parameters with [DefaultParameterValue] attributes should also be marked [Optional]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0087.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0087",
+ "title": "Parameters with [DefaultParameterValue] attributes should also be marked [Optional]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0087.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0087",
+ "title": "Parameters with [DefaultParameterValue] attributes should also be marked [Optional]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0087.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0087",
+ "title": "Parameters with [DefaultParameterValue] attributes should also be marked [Optional]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0087.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0088",
+ "title": "Use [DefaultParameterValue] instead of [DefaultValue]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0088.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0088",
+ "title": "Use [DefaultParameterValue] instead of [DefaultValue]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0088.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0088",
+ "title": "Use [DefaultParameterValue] instead of [DefaultValue]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0088.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0088",
+ "title": "Use [DefaultParameterValue] instead of [DefaultValue]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0088.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0088",
+ "title": "Use [DefaultParameterValue] instead of [DefaultValue]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0088.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0089",
+ "title": "Optimize string method usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0089.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0089",
+ "title": "Optimize string method usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0089.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0089",
+ "title": "Optimize string method usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0089.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0089",
+ "title": "Optimize string method usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0089.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0089",
+ "title": "Optimize string method usage",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0089.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0090",
+ "title": "Remove empty else/finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0090.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0090",
+ "title": "Remove empty else/finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0090.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0090",
+ "title": "Remove empty else/finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0090.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0090",
+ "title": "Remove empty else/finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0090.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0090",
+ "title": "Remove empty else/finally block",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0090.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0091",
+ "title": "Sender should be \u0027this\u0027 for instance events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0091.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0091",
+ "title": "Sender should be \u0027this\u0027 for instance events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0091.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0091",
+ "title": "Sender should be \u0027this\u0027 for instance events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0091.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0091",
+ "title": "Sender should be \u0027this\u0027 for instance events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0091.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0091",
+ "title": "Sender should be \u0027this\u0027 for instance events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0091.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0092",
+ "title": "Sender should be \u0027null\u0027 for static events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0092.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0092",
+ "title": "Sender should be \u0027null\u0027 for static events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0092.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0092",
+ "title": "Sender should be \u0027null\u0027 for static events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0092.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0092",
+ "title": "Sender should be \u0027null\u0027 for static events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0092.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0092",
+ "title": "Sender should be \u0027null\u0027 for static events",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0092.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0093",
+ "title": "EventArgs should not be null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0093.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0093",
+ "title": "EventArgs should not be null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0093.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0093",
+ "title": "EventArgs should not be null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0093.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0093",
+ "title": "EventArgs should not be null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0093.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0093",
+ "title": "EventArgs should not be null",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0093.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0094",
+ "title": "A class that provides CompareTo(T) should implement IComparable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0094.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0094",
+ "title": "A class that provides CompareTo(T) should implement IComparable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0094.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0094",
+ "title": "A class that provides CompareTo(T) should implement IComparable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0094.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0094",
+ "title": "A class that provides CompareTo(T) should implement IComparable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0094.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0094",
+ "title": "A class that provides CompareTo(T) should implement IComparable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0094.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0095",
+ "title": "A class that implements IEquatable\u003CT\u003E should override Equals(object)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0095.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0095",
+ "title": "A class that implements IEquatable\u003CT\u003E should override Equals(object)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0095.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0095",
+ "title": "A class that implements IEquatable\u003CT\u003E should override Equals(object)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0095.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0095",
+ "title": "A class that implements IEquatable\u003CT\u003E should override Equals(object)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0095.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0095",
+ "title": "A class that implements IEquatable\u003CT\u003E should override Equals(object)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0095.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0096",
+ "title": "A class that implements IComparable\u003CT\u003E should also implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0096.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0096",
+ "title": "A class that implements IComparable\u003CT\u003E should also implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0096.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0096",
+ "title": "A class that implements IComparable\u003CT\u003E should also implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0096.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0096",
+ "title": "A class that implements IComparable\u003CT\u003E should also implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0096.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0096",
+ "title": "A class that implements IComparable\u003CT\u003E should also implement IEquatable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0096.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0097",
+ "title": "A class that implements IComparable\u003CT\u003E or IComparable should override comparison operators",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0097.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0097",
+ "title": "A class that implements IComparable\u003CT\u003E or IComparable should override comparison operators",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0097.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0097",
+ "title": "A class that implements IComparable\u003CT\u003E or IComparable should override comparison operators",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0097.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0097",
+ "title": "A class that implements IComparable\u003CT\u003E or IComparable should override comparison operators",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0097.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0097",
+ "title": "A class that implements IComparable\u003CT\u003E or IComparable should override comparison operators",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0097.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0098",
+ "title": "Use indexer instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0098.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0098",
+ "title": "Use indexer instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0098.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0098",
+ "title": "Use indexer instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0098.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0098",
+ "title": "Use indexer instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0098.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0098",
+ "title": "Use indexer instead of LINQ methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0098.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0099",
+ "title": "Use Explicit enum value instead of 0",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0099.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0099",
+ "title": "Use Explicit enum value instead of 0",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0099.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0099",
+ "title": "Use Explicit enum value instead of 0",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0099.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0099",
+ "title": "Use Explicit enum value instead of 0",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0099.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0099",
+ "title": "Use Explicit enum value instead of 0",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0099.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0100",
+ "title": "Await task before disposing of resources",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0100.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Await the task before the end of the enclosing using block.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0100",
+ "title": "Await task before disposing of resources",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0100.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Await the task before the end of the enclosing using block.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0100",
+ "title": "Await task before disposing of resources",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0100.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Await the task before the end of the enclosing using block.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0100",
+ "title": "Await task before disposing of resources",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0100.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Await the task before the end of the enclosing using block.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0100",
+ "title": "Await task before disposing of resources",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0100.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Await the task before the end of the enclosing using block.",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0101",
+ "title": "String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0101.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0101",
+ "title": "String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0101.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0101",
+ "title": "String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0101.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0101",
+ "title": "String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0101.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0101",
+ "title": "String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0101.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0102",
+ "title": "Make member readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0102.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0102",
+ "title": "Make member readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0102.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0102",
+ "title": "Make member readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0102.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0102",
+ "title": "Make member readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0102.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0102",
+ "title": "Make member readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0102.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0103",
+ "title": "Use SequenceEqual instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0103.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0103",
+ "title": "Use SequenceEqual instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0103.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0103",
+ "title": "Use SequenceEqual instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0103.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0103",
+ "title": "Use SequenceEqual instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0103.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0103",
+ "title": "Use SequenceEqual instead of equality operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0103.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0104",
+ "title": "Do not create a type with a name from the BCL",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0104.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0104",
+ "title": "Do not create a type with a name from the BCL",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0104.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0104",
+ "title": "Do not create a type with a name from the BCL",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0104.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0104",
+ "title": "Do not create a type with a name from the BCL",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0104.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0104",
+ "title": "Do not create a type with a name from the BCL",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0104.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0105",
+ "title": "Use the lambda parameters instead of using a closure",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0105.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0105",
+ "title": "Use the lambda parameters instead of using a closure",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0105.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0105",
+ "title": "Use the lambda parameters instead of using a closure",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0105.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0105",
+ "title": "Use the lambda parameters instead of using a closure",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0105.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0105",
+ "title": "Use the lambda parameters instead of using a closure",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0105.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0106",
+ "title": "Avoid closure by using an overload with the \u0027factoryArgument\u0027 parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0106.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0106",
+ "title": "Avoid closure by using an overload with the \u0027factoryArgument\u0027 parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0106.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0106",
+ "title": "Avoid closure by using an overload with the \u0027factoryArgument\u0027 parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0106.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0106",
+ "title": "Avoid closure by using an overload with the \u0027factoryArgument\u0027 parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0106.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0106",
+ "title": "Avoid closure by using an overload with the \u0027factoryArgument\u0027 parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0106.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0107",
+ "title": "Do not use culture-sensitive object.ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0107.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0107",
+ "title": "Do not use culture-sensitive object.ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0107.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0107",
+ "title": "Do not use culture-sensitive object.ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0107.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0107",
+ "title": "Do not use culture-sensitive object.ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0107.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0107",
+ "title": "Do not use culture-sensitive object.ToString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0107.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0108",
+ "title": "Remove redundant argument value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0108.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0108",
+ "title": "Remove redundant argument value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0108.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0108",
+ "title": "Remove redundant argument value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0108.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0108",
+ "title": "Remove redundant argument value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0108.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0108",
+ "title": "Remove redundant argument value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0108.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0109",
+ "title": "Consider adding an overload with a Span\u003CT\u003E or Memory\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0109.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0109",
+ "title": "Consider adding an overload with a Span\u003CT\u003E or Memory\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0109.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0109",
+ "title": "Consider adding an overload with a Span\u003CT\u003E or Memory\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0109.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0109",
+ "title": "Consider adding an overload with a Span\u003CT\u003E or Memory\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0109.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0109",
+ "title": "Consider adding an overload with a Span\u003CT\u003E or Memory\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0109.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0110",
+ "title": "Use the Regex source generator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0110.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0110",
+ "title": "Use the Regex source generator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0110.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0110",
+ "title": "Use the Regex source generator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0110.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0110",
+ "title": "Use the Regex source generator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0110.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0110",
+ "title": "Use the Regex source generator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0110.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0111",
+ "title": "Use string.Create instead of FormattableString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0111.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0111",
+ "title": "Use string.Create instead of FormattableString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0111.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0111",
+ "title": "Use string.Create instead of FormattableString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0111.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0111",
+ "title": "Use string.Create instead of FormattableString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0111.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0111",
+ "title": "Use string.Create instead of FormattableString",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0111.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0112",
+ "title": "Use \u0027Count \u003E 0\u0027 instead of \u0027Any()\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0112.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0112",
+ "title": "Use \u0027Count \u003E 0\u0027 instead of \u0027Any()\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0112.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0112",
+ "title": "Use \u0027Count \u003E 0\u0027 instead of \u0027Any()\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0112.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0112",
+ "title": "Use \u0027Count \u003E 0\u0027 instead of \u0027Any()\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0112.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0112",
+ "title": "Use \u0027Count \u003E 0\u0027 instead of \u0027Any()\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0112.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0113",
+ "title": "Use DateTime.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0113.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0113",
+ "title": "Use DateTime.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0113.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0113",
+ "title": "Use DateTime.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0113.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0113",
+ "title": "Use DateTime.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0113.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0113",
+ "title": "Use DateTime.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0113.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0114",
+ "title": "Use DateTimeOffset.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0114.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0114",
+ "title": "Use DateTimeOffset.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0114.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0114",
+ "title": "Use DateTimeOffset.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0114.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0114",
+ "title": "Use DateTimeOffset.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0114.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0114",
+ "title": "Use DateTimeOffset.UnixEpoch",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0114.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0115",
+ "title": "Unknown component parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0115.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0115",
+ "title": "Unknown component parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0115.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0115",
+ "title": "Unknown component parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0115.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0115",
+ "title": "Unknown component parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0115.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0115",
+ "title": "Unknown component parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0115.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0116",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0116.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0116",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0116.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0116",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0116.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0116",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0116.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0116",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0116.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0117",
+ "title": "Parameters with [EditorRequired] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0117.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0117",
+ "title": "Parameters with [EditorRequired] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0117.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0117",
+ "title": "Parameters with [EditorRequired] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0117.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0117",
+ "title": "Parameters with [EditorRequired] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0117.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0117",
+ "title": "Parameters with [EditorRequired] attributes should also be marked as [Parameter]",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0117.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0118",
+ "title": "[JSInvokable] methods must be public",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0118.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0118",
+ "title": "[JSInvokable] methods must be public",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0118.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0118",
+ "title": "[JSInvokable] methods must be public",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0118.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0118",
+ "title": "[JSInvokable] methods must be public",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0118.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0118",
+ "title": "[JSInvokable] methods must be public",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0118.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0119",
+ "title": "JSRuntime must not be used in OnInitialized or OnInitializedAsync",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0119.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0119",
+ "title": "JSRuntime must not be used in OnInitialized or OnInitializedAsync",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0119.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0119",
+ "title": "JSRuntime must not be used in OnInitialized or OnInitializedAsync",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0119.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0119",
+ "title": "JSRuntime must not be used in OnInitialized or OnInitializedAsync",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0119.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0119",
+ "title": "JSRuntime must not be used in OnInitialized or OnInitializedAsync",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0119.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0120",
+ "title": "Use InvokeVoidAsync when the returned value is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0120.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0120",
+ "title": "Use InvokeVoidAsync when the returned value is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0120.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0120",
+ "title": "Use InvokeVoidAsync when the returned value is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0120.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0120",
+ "title": "Use InvokeVoidAsync when the returned value is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0120.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0120",
+ "title": "Use InvokeVoidAsync when the returned value is not used",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0120.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0121",
+ "title": "Do not overwrite parameter value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0121.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0121",
+ "title": "Do not overwrite parameter value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0121.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0121",
+ "title": "Do not overwrite parameter value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0121.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0121",
+ "title": "Do not overwrite parameter value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0121.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0121",
+ "title": "Do not overwrite parameter value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0121.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0122",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes are only valid in routable components (@page)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0122.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0122",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes are only valid in routable components (@page)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0122.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0122",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes are only valid in routable components (@page)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0122.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0122",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes are only valid in routable components (@page)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0122.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0122",
+ "title": "Parameters with [SupplyParameterFromQuery] attributes are only valid in routable components (@page)",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0122.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0123",
+ "title": "Sequence number must be a constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0123.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0123",
+ "title": "Sequence number must be a constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0123.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0123",
+ "title": "Sequence number must be a constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0123.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0123",
+ "title": "Sequence number must be a constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0123.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0123",
+ "title": "Sequence number must be a constant",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0123.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0124",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0124.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0124",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0124.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0124",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0124.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0124",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0124.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0124",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0124.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0125",
+ "title": "The list of log parameter types contains an invalid type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0125.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0125",
+ "title": "The list of log parameter types contains an invalid type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0125.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0125",
+ "title": "The list of log parameter types contains an invalid type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0125.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0125",
+ "title": "The list of log parameter types contains an invalid type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0125.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0125",
+ "title": "The list of log parameter types contains an invalid type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0125.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0126",
+ "title": "The list of log parameter types contains a duplicate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0126.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0126",
+ "title": "The list of log parameter types contains a duplicate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0126.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0126",
+ "title": "The list of log parameter types contains a duplicate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0126.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0126",
+ "title": "The list of log parameter types contains a duplicate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0126.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0126",
+ "title": "The list of log parameter types contains a duplicate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0126.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0127",
+ "title": "Use String.Equals instead of is pattern",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0127.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0127",
+ "title": "Use String.Equals instead of is pattern",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0127.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0127",
+ "title": "Use String.Equals instead of is pattern",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0127.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0127",
+ "title": "Use String.Equals instead of is pattern",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0127.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0127",
+ "title": "Use String.Equals instead of is pattern",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0127.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0128",
+ "title": "Use \u0027is\u0027 operator instead of SequenceEqual",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0128.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0128",
+ "title": "Use \u0027is\u0027 operator instead of SequenceEqual",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0128.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0128",
+ "title": "Use \u0027is\u0027 operator instead of SequenceEqual",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0128.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0128",
+ "title": "Use \u0027is\u0027 operator instead of SequenceEqual",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0128.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0128",
+ "title": "Use \u0027is\u0027 operator instead of SequenceEqual",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0128.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0129",
+ "title": "Await task in using statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0129.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0129",
+ "title": "Await task in using statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0129.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0129",
+ "title": "Await task in using statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0129.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0129",
+ "title": "Await task in using statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0129.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0129",
+ "title": "Await task in using statement",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0129.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0130",
+ "title": "GetType() should not be used on System.Type instances",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0130.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0130",
+ "title": "GetType() should not be used on System.Type instances",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0130.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0130",
+ "title": "GetType() should not be used on System.Type instances",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0130.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0130",
+ "title": "GetType() should not be used on System.Type instances",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0130.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0130",
+ "title": "GetType() should not be used on System.Type instances",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0130.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0131",
+ "title": "ArgumentNullException.ThrowIfNull should not be used with non-nullable types",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0131.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0131",
+ "title": "ArgumentNullException.ThrowIfNull should not be used with non-nullable types",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0131.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0131",
+ "title": "ArgumentNullException.ThrowIfNull should not be used with non-nullable types",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0131.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0131",
+ "title": "ArgumentNullException.ThrowIfNull should not be used with non-nullable types",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0131.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0131",
+ "title": "ArgumentNullException.ThrowIfNull should not be used with non-nullable types",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0131.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0132",
+ "title": "Do not convert implicitly to DateTimeOffset",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0132.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0132",
+ "title": "Do not convert implicitly to DateTimeOffset",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0132.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0132",
+ "title": "Do not convert implicitly to DateTimeOffset",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0132.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0132",
+ "title": "Do not convert implicitly to DateTimeOffset",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0132.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0132",
+ "title": "Do not convert implicitly to DateTimeOffset",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0132.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0133",
+ "title": "Use DateTimeOffset instead of relying on the implicit conversion",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0133.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0133",
+ "title": "Use DateTimeOffset instead of relying on the implicit conversion",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0133.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0133",
+ "title": "Use DateTimeOffset instead of relying on the implicit conversion",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0133.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0133",
+ "title": "Use DateTimeOffset instead of relying on the implicit conversion",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0133.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0133",
+ "title": "Use DateTimeOffset instead of relying on the implicit conversion",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0133.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0134",
+ "title": "Observe result of async calls",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0134.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0134",
+ "title": "Observe result of async calls",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0134.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0134",
+ "title": "Observe result of async calls",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0134.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0134",
+ "title": "Observe result of async calls",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0134.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0134",
+ "title": "Observe result of async calls",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0134.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0135",
+ "title": "The log parameter has no configured type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0135.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0135",
+ "title": "The log parameter has no configured type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0135.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0135",
+ "title": "The log parameter has no configured type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0135.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0135",
+ "title": "The log parameter has no configured type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0135.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0135",
+ "title": "The log parameter has no configured type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0135.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0136",
+ "title": "Raw String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0136.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0136",
+ "title": "Raw String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0136.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0136",
+ "title": "Raw String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0136.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0136",
+ "title": "Raw String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0136.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0136",
+ "title": "Raw String contains an implicit end of line character",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0136.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0137",
+ "title": "Use \u0027Async\u0027 suffix when a method returns an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0137.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0137",
+ "title": "Use \u0027Async\u0027 suffix when a method returns an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0137.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0137",
+ "title": "Use \u0027Async\u0027 suffix when a method returns an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0137.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0137",
+ "title": "Use \u0027Async\u0027 suffix when a method returns an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0137.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0137",
+ "title": "Use \u0027Async\u0027 suffix when a method returns an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0137.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0138",
+ "title": "Do not use \u0027Async\u0027 suffix when a method does not return an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0138.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0138",
+ "title": "Do not use \u0027Async\u0027 suffix when a method does not return an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0138.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0138",
+ "title": "Do not use \u0027Async\u0027 suffix when a method does not return an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0138.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0138",
+ "title": "Do not use \u0027Async\u0027 suffix when a method does not return an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0138.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0138",
+ "title": "Do not use \u0027Async\u0027 suffix when a method does not return an awaitable type",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0138.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0139",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0139.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0139",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0139.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0139",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0139.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0139",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0139.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0139",
+ "title": "Log parameter type is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0139.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0140",
+ "title": "Both if and else branch have identical code",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0140.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0140",
+ "title": "Both if and else branch have identical code",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0140.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0140",
+ "title": "Both if and else branch have identical code",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0140.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0140",
+ "title": "Both if and else branch have identical code",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0140.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0140",
+ "title": "Both if and else branch have identical code",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0140.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0141",
+ "title": "Use pattern matching instead of inequality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0141.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0141",
+ "title": "Use pattern matching instead of inequality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0141.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0141",
+ "title": "Use pattern matching instead of inequality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0141.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0141",
+ "title": "Use pattern matching instead of inequality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0141.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0141",
+ "title": "Use pattern matching instead of inequality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0141.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0142",
+ "title": "Use pattern matching instead of equality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0142.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0142",
+ "title": "Use pattern matching instead of equality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0142.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0142",
+ "title": "Use pattern matching instead of equality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0142.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0142",
+ "title": "Use pattern matching instead of equality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0142.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0142",
+ "title": "Use pattern matching instead of equality operators for null check",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0142.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0143",
+ "title": "Primary constructor parameters should be readonly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0143.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0144",
+ "title": "Use System.OperatingSystem to check the current OS",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0144.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0144",
+ "title": "Use System.OperatingSystem to check the current OS",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0144.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0144",
+ "title": "Use System.OperatingSystem to check the current OS",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0144.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0144",
+ "title": "Use System.OperatingSystem to check the current OS",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0144.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0144",
+ "title": "Use System.OperatingSystem to check the current OS",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0144.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0145",
+ "title": "Signature for [UnsafeAccessorAttribute] method is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0145.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0145",
+ "title": "Signature for [UnsafeAccessorAttribute] method is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0145.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0145",
+ "title": "Signature for [UnsafeAccessorAttribute] method is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0145.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0145",
+ "title": "Signature for [UnsafeAccessorAttribute] method is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0145.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0145",
+ "title": "Signature for [UnsafeAccessorAttribute] method is not valid",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0145.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0146",
+ "title": "Name must be set explicitly on local functions",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0146.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0146",
+ "title": "Name must be set explicitly on local functions",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0146.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0146",
+ "title": "Name must be set explicitly on local functions",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0146.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0146",
+ "title": "Name must be set explicitly on local functions",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0146.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0146",
+ "title": "Name must be set explicitly on local functions",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0146.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0147",
+ "title": "Avoid async void method for delegate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0147.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0147",
+ "title": "Avoid async void method for delegate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0147.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0147",
+ "title": "Avoid async void method for delegate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0147.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0147",
+ "title": "Avoid async void method for delegate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0147.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0147",
+ "title": "Avoid async void method for delegate",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0147.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0148",
+ "title": "Use pattern matching instead of equality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0148.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0148",
+ "title": "Use pattern matching instead of equality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0148.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0148",
+ "title": "Use pattern matching instead of equality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0148.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0148",
+ "title": "Use pattern matching instead of equality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0148.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0148",
+ "title": "Use pattern matching instead of equality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0148.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0149",
+ "title": "Use pattern matching instead of inequality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0149.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0149",
+ "title": "Use pattern matching instead of inequality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0149.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0149",
+ "title": "Use pattern matching instead of inequality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0149.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0149",
+ "title": "Use pattern matching instead of inequality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0149.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0149",
+ "title": "Use pattern matching instead of inequality operators for discrete value",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0149.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0150",
+ "title": "Do not call the default object.ToString explicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0150.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0150",
+ "title": "Do not call the default object.ToString explicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0150.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0150",
+ "title": "Do not call the default object.ToString explicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0150.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0150",
+ "title": "Do not call the default object.ToString explicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0150.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0150",
+ "title": "Do not call the default object.ToString explicitly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0150.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0151",
+ "title": "DebuggerDisplay must contain valid members",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0151.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0151",
+ "title": "DebuggerDisplay must contain valid members",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0151.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0151",
+ "title": "DebuggerDisplay must contain valid members",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0151.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0151",
+ "title": "DebuggerDisplay must contain valid members",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0151.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0151",
+ "title": "DebuggerDisplay must contain valid members",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0151.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0152",
+ "title": "Use Unwrap instead of using await twice",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0152.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0152",
+ "title": "Use Unwrap instead of using await twice",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0152.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0152",
+ "title": "Use Unwrap instead of using await twice",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0152.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0152",
+ "title": "Use Unwrap instead of using await twice",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0152.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0152",
+ "title": "Use Unwrap instead of using await twice",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0152.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0153",
+ "title": "Do not log symbols decorated with DataClassificationAttribute directly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0153.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0153",
+ "title": "Do not log symbols decorated with DataClassificationAttribute directly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0153.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0153",
+ "title": "Do not log symbols decorated with DataClassificationAttribute directly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0153.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0153",
+ "title": "Do not log symbols decorated with DataClassificationAttribute directly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0153.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0153",
+ "title": "Do not log symbols decorated with DataClassificationAttribute directly",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0153.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0154",
+ "title": "Use langword in XML comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0154.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0154",
+ "title": "Use langword in XML comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0154.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0154",
+ "title": "Use langword in XML comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0154.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0154",
+ "title": "Use langword in XML comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0154.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0154",
+ "title": "Use langword in XML comment",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0154.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0155",
+ "title": "Do not use async void methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0155.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0155",
+ "title": "Do not use async void methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0155.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0155",
+ "title": "Do not use async void methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0155.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0155",
+ "title": "Do not use async void methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0155.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0155",
+ "title": "Do not use async void methods",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0155.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0156",
+ "title": "Use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0156.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0156",
+ "title": "Use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0156.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0156",
+ "title": "Use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0156.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0156",
+ "title": "Use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0156.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0156",
+ "title": "Use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0156.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0157",
+ "title": "Do not use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0157.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0157",
+ "title": "Do not use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0157.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0157",
+ "title": "Do not use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0157.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0157",
+ "title": "Do not use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0157.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0157",
+ "title": "Do not use \u0027Async\u0027 suffix when a method returns IAsyncEnumerable\u003CT\u003E",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0157.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0158",
+ "title": "Use System.Threading.Lock",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0158.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0158",
+ "title": "Use System.Threading.Lock",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0158.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0158",
+ "title": "Use System.Threading.Lock",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0158.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0158",
+ "title": "Use System.Threading.Lock",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0158.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0158",
+ "title": "Use System.Threading.Lock",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0158.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0159",
+ "title": "Use \u0027Order\u0027 instead of \u0027OrderBy\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0159.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0159",
+ "title": "Use \u0027Order\u0027 instead of \u0027OrderBy\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0159.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0159",
+ "title": "Use \u0027Order\u0027 instead of \u0027OrderBy\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0159.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0159",
+ "title": "Use \u0027Order\u0027 instead of \u0027OrderBy\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0159.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0159",
+ "title": "Use \u0027Order\u0027 instead of \u0027OrderBy\u0027",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0159.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0160",
+ "title": "Use ContainsKey instead of TryGetValue",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0160.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0160",
+ "title": "Use ContainsKey instead of TryGetValue",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0160.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0160",
+ "title": "Use ContainsKey instead of TryGetValue",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0160.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0160",
+ "title": "Use ContainsKey instead of TryGetValue",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0160.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0160",
+ "title": "Use ContainsKey instead of TryGetValue",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0160.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0161",
+ "title": "UseShellExecute must be explicitly set",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0161.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0161",
+ "title": "UseShellExecute must be explicitly set",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0161.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0161",
+ "title": "UseShellExecute must be explicitly set",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0161.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0161",
+ "title": "UseShellExecute must be explicitly set",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0161.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0161",
+ "title": "UseShellExecute must be explicitly set",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0161.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0162",
+ "title": "Use Process.Start overload with ProcessStartInfo",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0162.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0162",
+ "title": "Use Process.Start overload with ProcessStartInfo",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0162.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0162",
+ "title": "Use Process.Start overload with ProcessStartInfo",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0162.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0162",
+ "title": "Use Process.Start overload with ProcessStartInfo",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0162.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0162",
+ "title": "Use Process.Start overload with ProcessStartInfo",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0162.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0163",
+ "title": "UseShellExecute must be false when redirecting standard input or output",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0163.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0163",
+ "title": "UseShellExecute must be false when redirecting standard input or output",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0163.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0163",
+ "title": "UseShellExecute must be false when redirecting standard input or output",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0163.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0163",
+ "title": "UseShellExecute must be false when redirecting standard input or output",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0163.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0163",
+ "title": "UseShellExecute must be false when redirecting standard input or output",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0163.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0164",
+ "title": "Use parentheses to make not pattern clearer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0164.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0164",
+ "title": "Use parentheses to make not pattern clearer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0164.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0164",
+ "title": "Use parentheses to make not pattern clearer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0164.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0164",
+ "title": "Use parentheses to make not pattern clearer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0164.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0164",
+ "title": "Use parentheses to make not pattern clearer",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0164.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0165",
+ "title": "Make interpolated string",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0165.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0165",
+ "title": "Make interpolated string",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0165.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0165",
+ "title": "Make interpolated string",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0165.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0165",
+ "title": "Make interpolated string",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0165.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0165",
+ "title": "Make interpolated string",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0165.md",
+ "category": "Other",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0166",
+ "title": "Forward the TimeProvider to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0166.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0166",
+ "title": "Forward the TimeProvider to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0166.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0166",
+ "title": "Forward the TimeProvider to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0166.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0166",
+ "title": "Forward the TimeProvider to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0166.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0166",
+ "title": "Forward the TimeProvider to methods that take one",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0166.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0167",
+ "title": "Use an overload with a TimeProvider argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0167.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0167",
+ "title": "Use an overload with a TimeProvider argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0167.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0167",
+ "title": "Use an overload with a TimeProvider argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0167.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0167",
+ "title": "Use an overload with a TimeProvider argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0167.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0167",
+ "title": "Use an overload with a TimeProvider argument",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0167.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0168",
+ "title": "Use readonly struct for in or ref readonly parameter",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0168.md",
+ "category": "Other",
+ "defaultSeverity": "suggestion",
+ "isEnabledByDefault": false,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0169",
+ "title": "Use Equals method instead of operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0169.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0169",
+ "title": "Use Equals method instead of operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0169.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0169",
+ "title": "Use Equals method instead of operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0169.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0169",
+ "title": "Use Equals method instead of operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0169.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "MA0169",
+ "title": "Use Equals method instead of operator",
+ "helpUrl": "https://github.com/meziantou/Meziantou.Analyzer/blob/main/docs/Rules/MA0169.md",
+ "category": "Other",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Meziantou.Analyzer"
+ },
+ {
+ "id": "RemoveUnnecessaryImportsFixable",
+ "title": "",
+ "helpUrl": "",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "",
+ "packageId": "Microsoft.CodeAnalysis.CSharp.CodeStyle"
+ },
+ {
+ "id": "RS0030",
+ "title": "Do not use banned APIs",
+ "helpUrl": "https://github.com/dotnet/roslyn/blob/main/src/RoslynAnalyzers/Microsoft.CodeAnalysis.BannedApiAnalyzers/BannedApiAnalyzers.Help.md",
+ "category": "Security",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The symbol has been marked as banned in this project, and an alternate should be used instead.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "RS0030",
+ "title": "Do not use banned APIs",
+ "helpUrl": "https://github.com/dotnet/roslyn/blob/main/src/RoslynAnalyzers/Microsoft.CodeAnalysis.BannedApiAnalyzers/BannedApiAnalyzers.Help.md",
+ "category": "Security",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The symbol has been marked as banned in this project, and an alternate should be used instead.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "RS0031",
+ "title": "The list of banned symbols contains a duplicate",
+ "helpUrl": "https://github.com/dotnet/roslyn/blob/main/src/RoslynAnalyzers/Microsoft.CodeAnalysis.BannedApiAnalyzers/BannedApiAnalyzers.Help.md",
+ "category": "Security",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The list of banned symbols contains a duplicate.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "RS0031",
+ "title": "The list of banned symbols contains a duplicate",
+ "helpUrl": "https://github.com/dotnet/roslyn/blob/main/src/RoslynAnalyzers/Microsoft.CodeAnalysis.BannedApiAnalyzers/BannedApiAnalyzers.Help.md",
+ "category": "Security",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The list of banned symbols contains a duplicate.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "RS0035",
+ "title": "External access to internal symbols outside the restricted namespace(s) is prohibited",
+ "helpUrl": "",
+ "category": "Security",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "RestrictedInternalsVisibleToAttribute enables a restricted version of InternalsVisibleToAttribute that limits access to internal symbols to those within specified namespaces. Each referencing assembly can only access internal symbols defined in the restricted namespaces that the referenced assembly allows.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "RS0035",
+ "title": "External access to internal symbols outside the restricted namespace(s) is prohibited",
+ "helpUrl": "",
+ "category": "Security",
+ "defaultSeverity": "error",
+ "isEnabledByDefault": true,
+ "description": "RestrictedInternalsVisibleToAttribute enables a restricted version of InternalsVisibleToAttribute that limits access to internal symbols to those within specified namespaces. Each referencing assembly can only access internal symbols defined in the restricted namespaces that the referenced assembly allows.",
+ "packageId": "Microsoft.CodeAnalysis.BannedApiAnalyzers"
+ },
+ {
+ "id": "SA0001",
+ "title": "XML comment analysis disabled",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA0001.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "XML comment analysis can only be performed when the project is configured to parse documentation comments. To enable this functionality, update the project to produce an XML documentation file as part of the build.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA0002",
+ "title": "Invalid settings file",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA0002.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Various errors in the stylecop.json file can prevent the file from being loaded by the analyzers. In this case, the default settings are used instead.\r\n\r\n{0}",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1000",
+ "title": "Keywords should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1000.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The spacing around a C# keyword is incorrect.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1001",
+ "title": "Commas should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1001.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The spacing around a comma is incorrect, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1002",
+ "title": "Semicolons should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1002.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The spacing around a semicolon is incorrect, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1003",
+ "title": "Symbols should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1003.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The spacing around an operator symbol is incorrect, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1004",
+ "title": "Documentation lines should begin with single space",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1004.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A line within a documentation header above a C# element does not begin with a single space.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1005",
+ "title": "Single line comments should begin with single space",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1005.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A single-line comment within a C# code file does not begin with a single space.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1006",
+ "title": "Preprocessor keywords should not be preceded by space",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1006.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# preprocessor-type keyword is preceded by space.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1007",
+ "title": "Operator keyword should be followed by space",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1007.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The operator keyword within a C# operator overload method is not followed by any whitespace.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1008",
+ "title": "Opening parenthesis should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1008.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening parenthesis within a C# statement is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1009",
+ "title": "Closing parenthesis should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1009.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing parenthesis within a C# statement is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1010",
+ "title": "Opening square brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1010.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening square bracket within a C# statement is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1011",
+ "title": "Closing square brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1011.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing square bracket within a C# statement is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1012",
+ "title": "Opening braces should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1012.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening brace within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1013",
+ "title": "Closing braces should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1013.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing brace within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1014",
+ "title": "Opening generic brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1014.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening generic bracket within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1015",
+ "title": "Closing generic brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1015.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing generic bracket within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1016",
+ "title": "Opening attribute brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1016.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening attribute bracket within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1017",
+ "title": "Closing attribute brackets should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1017.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing attribute bracket within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1018",
+ "title": "Nullable type symbols should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1018.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A nullable type symbol within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1019",
+ "title": "Member access symbols should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1019.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The spacing around a member access symbol is incorrect, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1020",
+ "title": "Increment decrement symbols should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1020.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An increment or decrement symbol within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1021",
+ "title": "Negative signs should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1021.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A negative sign within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1022",
+ "title": "Positive signs should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1022.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A positive sign within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1023",
+ "title": "Dereference and access of symbols should be spaced correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1023.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A dereference symbol or an access-of symbol within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1024",
+ "title": "Colons Should Be Spaced Correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1024.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A colon within a C# element is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1025",
+ "title": "Code should not contain multiple whitespace in a row",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1025.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The code contains multiple whitespace characters in a row.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1026",
+ "title": "Code should not contain space after new or stackalloc keyword in implicitly typed array allocation",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1026.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An implicitly typed array allocation within a C# code file is not spaced correctly.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1027",
+ "title": "Use tabs correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1027.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The code contains a tab or space character which is not consistent with the current project settings.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1028",
+ "title": "Code should not contain trailing whitespace",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1028.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "There should not be any whitespace at the end of a line of code.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1100",
+ "title": "Do not prefix calls with base unless local implementation exists",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1100.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to a member from an inherited class begins with \u0027base.\u0027, and the local class does not contain an override or implementation of the member.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1101",
+ "title": "Prefix local calls with this",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1101.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to an instance member of the local class or a base class is not prefixed with \u0027this.\u0027, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1102",
+ "title": "Query clause should follow previous clause",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1102.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# query clause does not begin on the same line as the previous clause, or on the next line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1103",
+ "title": "Query clauses should be on separate lines or all on one line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1103.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The clauses within a C# query expression are not all placed on the same line, and each clause is not placed on its own line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1104",
+ "title": "Query clause should begin on new line when previous clause spans multiple lines",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1104.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A clause within a C# query expression begins on the same line as the previous clause, when the previous clause spans across multiple lines.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1105",
+ "title": "Query clauses spanning multiple lines should begin on own line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1105.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A clause within a C# query expression spans across multiple lines, and does not begin on its own line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1106",
+ "title": "Code should not contain empty statements",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1106.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains an extra semicolon.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1107",
+ "title": "Code should not contain multiple statements on one line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1107.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains more than one statement on a single line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1108",
+ "title": "Block statements should not contain embedded comments",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1108.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# statement contains a comment between the declaration of the statement and the opening brace of the statement.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1109",
+ "title": "Block statements should not contain embedded regions",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1109.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A C# statement contains a region tag between the declaration of the statement and the opening brace of the statement.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1110",
+ "title": "Opening parenthesis or bracket should be on declaration line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1110.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The opening parenthesis or bracket is not placed on the same line as the method/indexer/attribute/array name.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1111",
+ "title": "Closing parenthesis should be on line of last parameter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1111.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The closing parenthesis or bracket in a call to or declaration of a C# method/indexer/attribute/array/constructor/delegate is not placed on the same line as the last parameter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1112",
+ "title": "Closing parenthesis should be on line of opening parenthesis",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1112.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The closing parenthesis or bracket in a call to a C# method or indexer, or the declaration of a method or indexer, is not placed on the same line as the opening bracket when the element does not take any parameters.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1113",
+ "title": "Comma should be on the same line as previous parameter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1113.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A comma between two parameters in a call to a C# method or indexer, or in the declaration of a method or indexer, is not placed on the same line as the previous parameter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1114",
+ "title": "Parameter list should follow declaration",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1114.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The start of the parameter list for a method/constructor/indexer/array/operator call or declaration does not begin on the same line as the opening bracket, or on the line after the opening bracket.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1115",
+ "title": "Parameter should follow comma",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1115.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A parameter within a C# method or indexer call or declaration does not begin on the same line as the previous parameter, or on the next line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1116",
+ "title": "Split parameters should start on line after declaration",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1116.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameters to a C# method or indexer call or declaration span across multiple lines, but the first parameter does not start on the line after the opening bracket.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1117",
+ "title": "Parameters should be on same line or separate lines",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1117.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The parameters to a C# method or indexer call or declaration are not all on the same line or each on a separate line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1118",
+ "title": "Parameter should not span multiple lines",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1118.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A parameter to a C# method/indexer/attribute/array, other than the first parameter, spans across multiple lines. If the parameter is short, place the entire parameter on a single line. Otherwise, save the contents of the parameter in a temporary variable and pass the temporary variable as a parameter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1119",
+ "title": "Statement should not use unnecessary parenthesis",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1119.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# statement contains parenthesis which are unnecessary and should be removed.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1119_p",
+ "title": "Statement should not use unnecessary parenthesis",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1119.md",
+ "category": "Style",
+ "defaultSeverity": "silent",
+ "isEnabledByDefault": true,
+ "description": "A C# statement contains parenthesis which are unnecessary and should be removed.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1120",
+ "title": "Comments should contain text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1120.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# comment does not contain any comment text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1121",
+ "title": "Use built-in type alias",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1121.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The code uses one of the basic C# types, but does not use the built-in alias for the type.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1122",
+ "title": "Use string.Empty for empty strings",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1122.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code includes an empty string, written as \u0022\u0022.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1123",
+ "title": "Do not place regions within elements",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1123.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains a region within the body of a code element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1124",
+ "title": "Do not use regions",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1124.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains a region.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1125",
+ "title": "Use shorthand for nullable types",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1125.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The Nullable\u003CT\u003E type has been defined not using the C# shorthand. For example, Nullable\u003CDateTime\u003E has been used instead of the preferred DateTime?",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1126",
+ "title": "Prefix calls correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1126.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A call to a member is not prefixed with the \u0027this.\u0027, \u0027base.\u0027, \u0027object.\u0027 or \u0027typename.\u0027 prefix to indicate the intended method call, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1127",
+ "title": "Generic type constraints should be on their own line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1127.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Each type constraint clause for a generic type parameter should be listed on a line of code by itself.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1128",
+ "title": "Put constructor initializers on their own line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1128.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A constructor initializer, including the colon character, should be on its own line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1129",
+ "title": "Do not use default value type constructor",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1129.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "When creating a new instance of a value type T, the syntax \u0027default(T)\u0027 is functionally equivalent to the syntax \u0027new T()\u0027. To avoid confusion regarding the behavior of the resulting instance, the first form is preferred.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1130",
+ "title": "Use lambda syntax",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1130.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Lambda expressions are more succinct and easier to read than anonymous methods, so they should are preferred whenever the two are functionally equivalent.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1131",
+ "title": "Use readable conditions",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1131.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "When a comparison is made between a variable and a literal, the variable should be placed on the left-hand-side to maximize readability.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1132",
+ "title": "Do not combine fields",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1132.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Each field should be declared on its own line, in order to clearly see each field of a type and allow for proper documentation of the behavior of each field.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1133",
+ "title": "Do not combine attributes",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1133.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Each attribute usage should be placed in its own set of square brackets for maximum readability.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1134",
+ "title": "Attributes should not share line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1134.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Each attribute should be placed on its own line of code.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1135",
+ "title": "Using directives should be qualified",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1135.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "All using directives should be qualified.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1136",
+ "title": "Enum values should be on separate lines",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1136.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Enum values should be placed on their own lines for maximum readability.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1137",
+ "title": "Elements should have the same indentation",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1137.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Elements at the same level in the syntax tree should have the same indentation.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1139",
+ "title": "Use literal suffix notation instead of casting",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1139.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Use literal suffix notation instead of casting, in order to improve readability, avoid bugs related to illegal casts and ensure that optimal IL is produced.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1141",
+ "title": "Use tuple syntax",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1141.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Use tuple syntax instead of the underlying ValueTuple implementation type.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1142",
+ "title": "Refer to tuple fields by name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1142.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A field of a tuple was referenced by its metadata name when a field name is available.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1200",
+ "title": "Using directives should be placed correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1200.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# using directive is placed outside of a namespace element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1201",
+ "title": "Elements should appear in the correct order",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1201.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An element within a C# code file is out of order in relation to the other elements in the code.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1202",
+ "title": "Elements should be ordered by access",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1202.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An element within a C# code file is out of order in relation to other elements in the code.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1203",
+ "title": "Constants should appear before fields",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1203.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A constant field is placed beneath a non-constant field.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1204",
+ "title": "Static elements should appear before instance elements",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1204.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A static element is positioned beneath an instance element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1205",
+ "title": "Partial elements should declare access",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1205.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The partial element does not have an access modifier defined.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1206",
+ "title": "Declaration keywords should follow order",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1206.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The keywords within the declaration of an element do not follow a standard ordering scheme.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1207",
+ "title": "Protected should come before internal",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1207.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The keyword \u0027{0}\u0027 is positioned after the keyword \u0027{1}\u0027 within the declaration of a {0} {1} C# element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1208",
+ "title": "System using directives should be placed before other using directives",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1208.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A using directive which declares a member of the \u0027System\u0027 namespace appears after a using directive which declares a member of a different namespace, within a C# code file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1209",
+ "title": "Using alias directives should be placed after other using directives",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1209.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A using-alias directive is positioned before a regular using directive.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1210",
+ "title": "Using directives should be ordered alphabetically by namespace",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1210.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The using directives within a C# code file are not sorted alphabetically by namespace.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1211",
+ "title": "Using alias directives should be ordered alphabetically by alias name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1211.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The using-alias directives within a C# code file are not sorted alphabetically by alias name.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1212",
+ "title": "Property accessors should follow order",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1212.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A get accessor appears after a set accessor within a property or indexer.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1213",
+ "title": "Event accessors should follow order",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1213.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An add accessor appears after a remove accessor within an event.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1214",
+ "title": "Readonly fields should appear before non-readonly fields",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1214.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A readonly field is positioned beneath a non-readonly field.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1216",
+ "title": "Using static directives should be placed at the correct location",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1216.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A using static directive is positioned before a regular or after an alias using directive.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1217",
+ "title": "Using static directives should be ordered alphabetically",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1217.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "All using static directives should be ordered alphabetically.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1300",
+ "title": "Element should begin with upper-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1300.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a C# element does not begin with an upper-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1301",
+ "title": "Element should begin with lower-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1301.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "There are currently no situations in which this rule will fire.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1302",
+ "title": "Interface names should begin with I",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1302.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a C# interface does not begin with the capital letter I.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1303",
+ "title": "Const field names should begin with upper-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1303.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a constant C# field should begin with an upper-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1304",
+ "title": "Non-private readonly fields should begin with upper-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1304.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a non-private readonly C# field should being with an upper-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1305",
+ "title": "Field names should not use Hungarian notation",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1305.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The name of a field or variable in C# uses Hungarian notation.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1306",
+ "title": "Field names should begin with lower-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1306.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a field in C# does not begin with a lower-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1307",
+ "title": "Accessible fields should begin with upper-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1307.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a public or internal field in C# does not begin with an upper-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1308",
+ "title": "Variable names should not be prefixed",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1308.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A field name in C# is prefixed with \u0027m_\u0027, \u0027s_\u0027, or \u0027t_\u0027.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1309",
+ "title": "Field names should not begin with underscore",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1309.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A field name in C# begins with an underscore.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1310",
+ "title": "Field names should not contain underscore",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1310.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A field name in C# contains an underscore.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1311",
+ "title": "Static readonly fields should begin with upper-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1311.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a static readonly field does not begin with an upper-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1312",
+ "title": "Variable names should begin with lower-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1312.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a variable in C# does not begin with a lower-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1313",
+ "title": "Parameter names should begin with lower-case letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1313.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a parameter in C# does not begin with a lower-case letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1314",
+ "title": "Type parameter names should begin with T",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1314.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The name of a C# type parameter does not begin with the capital letter T.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1316",
+ "title": "Tuple element names should use correct casing",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1316.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Element names within a tuple type should have the correct casing.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1400",
+ "title": "Access modifier should be declared",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1400.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The access modifier for a C# element has not been explicitly defined.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1401",
+ "title": "Fields should be private",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1401.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A field within a C# class has an access modifier other than private.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1402",
+ "title": "File may only contain a single type",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1402.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# code file contains more than one unique type.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1403",
+ "title": "File may only contain a single namespace",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1403.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# code file contains more than one namespace.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1404",
+ "title": "Code analysis suppression should have justification",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1404.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A Code Analysis SuppressMessage attribute does not include a justification.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1405",
+ "title": "Debug.Assert should provide message text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1405.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to Debug.Assert in C# code does not include a descriptive message.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1406",
+ "title": "Debug.Fail should provide message text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1406.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to Debug.Fail in C# code does not include a descriptive message.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1407",
+ "title": "Arithmetic expressions should declare precedence",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1407.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# statement contains a complex arithmetic expression which omits parenthesis around operators.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1408",
+ "title": "Conditional expressions should declare precedence",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1408.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# statement contains a complex conditional expression which omits parenthesis around operators.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1409",
+ "title": "Remove unnecessary code",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1409.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A C# file contains code which is unnecessary and can be removed without changing the overall logic of the code.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1410",
+ "title": "Remove delegate parenthesis when possible",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1410.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A call to a C# anonymous method does not contain any method parameters, yet the statement still includes parenthesis.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1411",
+ "title": "Attribute constructor should not use unnecessary parenthesis",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1411.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "TODO.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1412",
+ "title": "Store files as UTF-8 with byte order mark",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1412.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "Source files should be saved using the UTF-8 encoding with a byte order mark.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1413",
+ "title": "Use trailing comma in multi-line initializers",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1413.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A multi-line initializer in a C# code file should use a comma on the last line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1414",
+ "title": "Tuple types in signatures should have element names",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1414.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Tuple types appearing in member declarations should have explicitly named tuple elements.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1500",
+ "title": "Braces for multi-line statements should not share line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1500.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The opening or closing brace within a C# statement, element, or expression is not placed on its own line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1501",
+ "title": "Statement should not be on a single line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1501.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# statement containing opening and closing braces is written completely on a single line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1502",
+ "title": "Element should not be on a single line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1502.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# element containing opening and closing braces is written completely on a single line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1503",
+ "title": "Braces should not be omitted",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1503.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The opening and closing braces for a C# statement have been omitted.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1504",
+ "title": "All accessors should be single-line or multi-line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1504.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Within a C# property, indexer or event, at least one of the child accessors is written on a single line, and at least one of the child accessors is written across multiple lines.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1505",
+ "title": "Opening braces should not be followed by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1505.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening brace within a C# element, statement, or expression is followed by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1506",
+ "title": "Element documentation headers should not be followed by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1506.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An element documentation header above a C# element is followed by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1507",
+ "title": "Code should not contain multiple blank lines in a row",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1507.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains multiple blank lines in a row.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1508",
+ "title": "Closing braces should not be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1508.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing brace within a C# element, statement, or expression is preceded by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1509",
+ "title": "Opening braces should not be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1509.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An opening brace within a C# element, statement, or expression is preceded by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1510",
+ "title": "Chained statement blocks should not be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1510.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Chained C# statements are separated by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1511",
+ "title": "While-do footer should not be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1511.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The while footer at the bottom of a do-while statement is separated from the statement by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1512",
+ "title": "Single-line comments should not be followed by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1512.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A single-line comment within C# code is followed by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1513",
+ "title": "Closing brace should be followed by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1513.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A closing brace within a C# element, statement, or expression is not followed by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1514",
+ "title": "Element documentation header should be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1514.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An element documentation header above a C# element is not preceded by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1515",
+ "title": "Single-line comment should be preceded by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1515.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A single-line comment within C# code is not preceded by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1516",
+ "title": "Elements should be separated by blank line",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1516.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Adjacent C# elements are not separated by a blank line.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1517",
+ "title": "Code should not contain blank lines at start of file",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1517.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The code file has blank lines at the start.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1518",
+ "title": "Use line endings correctly at end of file",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1518.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "Code should not contain blank lines at the end of the file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1519",
+ "title": "Braces should not be omitted from multi-line child statement",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1519.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The opening and closing braces for a multi-line C# statement have been omitted.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1520",
+ "title": "Use braces consistently",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1520.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The opening and closing braces of a chained if/else if/else construct were included for some clauses, but omitted for others.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1600",
+ "title": "Elements should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1600.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# code element is missing a documentation header.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1601",
+ "title": "Partial elements should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1601.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# partial element is missing a documentation header.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1602",
+ "title": "Enumeration items should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1602.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "An item within a C# enumeration is missing an Xml documentation header.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1603",
+ "title": "Documentation should contain valid XML",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1603.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The XML within a C# element\u2019s document header is badly formed.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1604",
+ "title": "Element documentation should have summary",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1604.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The XML header documentation for a C# element is missing a \u003Csummary\u003E tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1605",
+ "title": "Partial element documentation should have summary",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1605.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Csummary\u003E or \u003Ccontent\u003E tag within the documentation header for a C# code element is missing or empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1606",
+ "title": "Element documentation should have summary text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1606.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Csummary\u003E tag within the documentation header for a C# code element is empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1607",
+ "title": "Partial element documentation should have summary text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1607.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Csummary\u003E or \u003Ccontent\u003E tag within the documentation header for a C# code element is empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1608",
+ "title": "Element documentation should not have default summary",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1608.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Csummary\u003E tag within an element\u0027s XML header documentation contains the default text generated by Visual Studio during the creation of the element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1609",
+ "title": "Property documentation should have value",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1609.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The XML header documentation for a C# property does not contain a \u003Cvalue\u003E tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1610",
+ "title": "Property documentation should have value text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1610.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The XML header documentation for a C# property contains an empty \u003Cvalue\u003E tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1611",
+ "title": "Element parameters should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1611.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# method, constructor, delegate or indexer element is missing documentation for one or more of its parameters.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1612",
+ "title": "Element parameter documentation should match element parameters",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1612.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The documentation describing the parameters to a C# method, constructor, delegate or indexer element does not match the actual parameters on the element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1613",
+ "title": "Element parameter documentation should declare parameter name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1613.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A \u003Cparam\u003E tag within a C# element\u0027s documentation header is missing a name attribute containing the name of the parameter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1614",
+ "title": "Element parameter documentation should have text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1614.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A \u003Cparam\u003E tag within a C# element\u0027s documentation header is empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1615",
+ "title": "Element return value should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1615.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# element is missing documentation for its return value.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1616",
+ "title": "Element return value documentation should have text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1616.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Creturns\u003E tag within a C# element\u0027s documentation header is empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1617",
+ "title": "Void return value should not be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1617.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# code element does not contain a return value, or returns void, but the documentation header for the element contains a \u003Creturns\u003E tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1618",
+ "title": "Generic type parameters should be documented",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1618.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A generic C# element is missing documentation for one or more of its generic type parameters.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1619",
+ "title": "Generic type parameters should be documented partial class",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1619.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A generic, partial C# element is missing documentation for one or more of its generic type parameters, and the documentation for the element contains a \u003Csummary\u003E tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1620",
+ "title": "Generic type parameter documentation should match type parameters",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1620.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The \u003Ctypeparam\u003E tags within the Xml header documentation for a generic C# element do not match the generic type parameters on the element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1621",
+ "title": "Generic type parameter documentation should declare parameter name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1621.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A \u003Ctypeparam\u003E tag within the XML header documentation for a generic C# element is missing a name attribute, or contains an empty name attribute.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1622",
+ "title": "Generic type parameter documentation should have text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1622.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A \u003Ctypeparam\u003E tag within the Xml header documentation for a generic C# element is empty.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1623",
+ "title": "Property summary documentation should match accessors",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1623.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The documentation text within a C# property\u2019s \u003Csummary\u003E tag does not match the accessors within the property.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1624",
+ "title": "Property summary documentation should omit accessor with restricted access",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1624.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The documentation text within a C# property\u2019s \u003Csummary\u003E tag takes into account all of the accessors within the property, but one of the accessors has limited access.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1625",
+ "title": "Element documentation should not be copied and pasted",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1625.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The Xml documentation for a C# element contains two or more identical entries, indicating that the documentation has been copied and pasted. This can sometimes indicate invalid or poorly written documentation.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1626",
+ "title": "Single-line comments should not use documentation style slashes",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1626.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The C# code contains a single-line comment which begins with three forward slashes in a row.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1627",
+ "title": "Documentation text should not be empty",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1627.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The XML header documentation for a C# code element contains an empty tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1628",
+ "title": "Documentation text should begin with a capital letter",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1628.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A section of the XML header documentation for a C# element does not begin with a capital letter.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1629",
+ "title": "Documentation text should end with a period",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1629.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A section of the XML header documentation for a C# element does not end with a period.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1630",
+ "title": "Documentation text should contain whitespace",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1630.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A section of the XML header documentation for a C# element does not contain any whitespace between words.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1631",
+ "title": "Documentation should meet character percentage",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1631.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A section of the Xml header documentation for a C# element does not contain enough alphabetic characters.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1632",
+ "title": "Documentation text should meet minimum character length",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1632.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A section of the Xml header documentation for a C# element is too short.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1633",
+ "title": "File should have header",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1633.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "A C# code file is missing a standard file header.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1634",
+ "title": "File header should show copyright",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1634.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file is missing a copyright tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1635",
+ "title": "File header should have copyright text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1635.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file is missing copyright text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1636",
+ "title": "File header copyright text should match",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1636.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file does not contain the appropriate copyright text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1637",
+ "title": "File header should contain file name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1637.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file is missing the file name.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1638",
+ "title": "File header file name documentation should match file name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1638.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file attribute within copyright tag of the file header at the top of a C# code file does not contain the name of the file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1639",
+ "title": "File header should have summary",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1639.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The file header at the top of a C# code file does not contain a filled-in summary tag.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1640",
+ "title": "File header should have valid company text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1640.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file does not contain company name text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1641",
+ "title": "File header company name text should match",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1641.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file header at the top of a C# code file does not contain the appropriate company name text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1642",
+ "title": "Constructor summary documentation should begin with standard text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1642.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The XML documentation header for a C# constructor does not contain the appropriate summary text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1643",
+ "title": "Destructor summary documentation should begin with standard text",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1643.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The XML documentation header for a C# finalizer does not contain the appropriate summary text.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1644",
+ "title": "Documentation headers should not contain blank lines",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1644.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A section within the XML documentation header for a C# element contains blank lines.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1645",
+ "title": "Included documentation file does not exist",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1645.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An included XML documentation file does not exist.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1646",
+ "title": "Included documentation XPath does not exist",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1646.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An included XML documentation link contains an invalid path.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1647",
+ "title": "Include node does not contain valid file and path",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1647.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "An include tag within an XML documentation header does not contain valid file and path attribute.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1648",
+ "title": "inheritdoc should be used with inheriting class",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1648.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "\u003Cinheritdoc\u003E has been used on an element that doesn\u0027t inherit from a base class or implement an interface.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1649",
+ "title": "File name should match first type name",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1649.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The file name of a C# code file does not match the first type declared in the file.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1650",
+ "title": "Element documentation should be spelled correctly",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1650.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "The element documentation for the element contains one or more spelling mistakes or unrecognized words.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SA1651",
+ "title": "Do not use placeholder elements",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SA1651.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": true,
+ "description": "The element documentation contains a \u003Cplaceholder\u003E element.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SX1101",
+ "title": "Do not prefix local calls with \u0027this.\u0027",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SX1101.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A call to an instance member of the local class or a base class is prefixed with \u0060this.\u0060.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SX1309",
+ "title": "Field names should begin with underscore",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SX1309.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A field name in C# does not begin with an underscore.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ },
+ {
+ "id": "SX1309S",
+ "title": "Static field names should begin with underscore",
+ "helpUrl": "https://github.com/DotNetAnalyzers/StyleCopAnalyzers/blob/master/documentation/SX1309S.md",
+ "category": "Style",
+ "defaultSeverity": "warning",
+ "isEnabledByDefault": false,
+ "description": "A static field name in C# does not begin with an underscore.",
+ "packageId": "StyleCop.Analyzers.Unstable"
+ }
+]
\ No newline at end of file
diff --git a/tools/ConfigurationFilesGenerator/Program.cs b/tools/ConfigurationFilesGenerator/Program.cs
index 02d5174..de93c65 100644
--- a/tools/ConfigurationFilesGenerator/Program.cs
+++ b/tools/ConfigurationFilesGenerator/Program.cs
@@ -17,11 +17,35 @@
using System.Text;
using System.Text.RegularExpressions;
using NuGet.Frameworks;
+using System.Text.Json;
var rootFolder = GetRootFolderPath();
var writtenFiles = 0;
var packages = await GetAllReferencedNuGetPackages();
+var allRules = new List();
+
+#pragma warning disable CA1869 // Cache and reuse 'JsonSerializerOptions' instances - this is only called once at the end
+var jsonOptions = new JsonSerializerOptions
+{
+ WriteIndented = true,
+ PropertyNamingPolicy = JsonNamingPolicy.CamelCase,
+};
+#pragma warning restore CA1869
+
+static string GetSeverityString(DiagnosticSeverity? severity)
+{
+ return severity switch
+ {
+ null => "none",
+ DiagnosticSeverity.Hidden => "silent",
+ DiagnosticSeverity.Info => "suggestion",
+ DiagnosticSeverity.Warning => "warning",
+ DiagnosticSeverity.Error => "error",
+ _ => throw new Exception($"Severity '{severity}' is not supported"),
+ };
+}
+
await Parallel.ForEachAsync(packages, async (item, cancellationToken) =>
{
var (packageId, packageVersion) = item;
@@ -30,6 +54,7 @@ await Parallel.ForEachAsync(packages, async (item, cancellationToken) =>
var configurationFilePath = rootFolder / "src" / "files" / "analyzers" / ("Analyzer." + packageId + ".editorconfig");
var rules = new HashSet();
+ var category = DetermineCategoryFromPackageId(packageId);
foreach (var assembly in await GetAnalyzerReferences(packageId, packageVersion))
{
foreach (var type in assembly.GetTypes())
@@ -43,6 +68,22 @@ await Parallel.ForEachAsync(packages, async (item, cancellationToken) =>
foreach (var diagnostic in analyzer.SupportedDiagnostics)
{
rules.Add(new AnalyzerRule(diagnostic.Id, diagnostic.Title.ToString(CultureInfo.InvariantCulture), diagnostic.HelpLinkUri, diagnostic.IsEnabledByDefault, diagnostic.DefaultSeverity, diagnostic.IsEnabledByDefault ? diagnostic.DefaultSeverity : null));
+
+ // Add to allRules for JSON export
+ lock (allRules)
+ {
+ allRules.Add(new RuleMetadata
+ {
+ Id = diagnostic.Id,
+ Title = diagnostic.Title.ToString(CultureInfo.InvariantCulture),
+ HelpUrl = diagnostic.HelpLinkUri ?? "",
+ Category = category,
+ DefaultSeverity = GetSeverityString(diagnostic.DefaultSeverity),
+ IsEnabledByDefault = diagnostic.IsEnabledByDefault,
+ Description = diagnostic.Description.ToString(CultureInfo.InvariantCulture),
+ PackageId = packageId,
+ });
+ }
}
}
}
@@ -106,22 +147,30 @@ await Parallel.ForEachAsync(packages, async (item, cancellationToken) =>
configurationFilePath.CreateParentDirectory();
await File.WriteAllTextAsync(configurationFilePath, text, cancellationToken);
_ = Interlocked.Increment(ref writtenFiles);
+ }
- static string GetSeverity(DiagnosticSeverity? severity)
+ static string GetSeverity(DiagnosticSeverity? severity)
+ {
+ return severity switch
{
- return severity switch
- {
- null => "none",
- DiagnosticSeverity.Hidden => "silent",
- DiagnosticSeverity.Info => "suggestion",
- DiagnosticSeverity.Warning => "warning",
- DiagnosticSeverity.Error => "error",
- _ => throw new Exception($"Severity '{severity}' is not supported"),
- };
- }
+ null => "none",
+ DiagnosticSeverity.Hidden => "silent",
+ DiagnosticSeverity.Info => "suggestion",
+ DiagnosticSeverity.Warning => "warning",
+ DiagnosticSeverity.Error => "error",
+ _ => throw new Exception($"Severity '{severity}' is not supported"),
+ };
}
});
+// Export rule metadata as JSON
+var jsonOutputPath = rootFolder / "docs" / "rules-metadata.json";
+jsonOutputPath.CreateParentDirectory();
+
+var rulesJson = JsonSerializer.Serialize(allRules.OrderBy(r => r.Id).ToList(), jsonOptions);
+await File.WriteAllTextAsync(jsonOutputPath, rulesJson);
+Console.WriteLine($"Exported {allRules.Count} rules to {jsonOutputPath}");
+
if (writtenFiles > 0)
{
await Console.Error.WriteLineAsync("The content of the .editorconfig files is out of date. If this occurs on CI, you need to run the Build.ps1 command on your machine and commit the new .editorconfig files.");
@@ -388,6 +437,32 @@ static async Task GetAnalyzerReferences(string packageId, NuGetVersi
return (rules.ToArray(), unknowns.ToArray());
}
+static string DetermineCategoryFromPackageId(string packageId)
+{
+ return packageId switch
+ {
+ var id when id.Contains("StyleCop") => "Style",
+ var id when id.Contains("CodeStyle") => "Style",
+ var id when id.Contains("Security") => "Security",
+ var id when id.Contains("Performance") => "Performance",
+ var id when id.Contains("NetAnalyzers") => "Quality",
+ var id when id.Contains("BannedApi") => "Security",
+ _ => "Other"
+ };
+}
+
internal sealed record AnalyzerConfiguration(string Id, string[] Comments, DiagnosticSeverity? Severity);
internal sealed record AnalyzerRule(string Id, string Title, string? Url, bool Enabled, DiagnosticSeverity DefaultSeverity, DiagnosticSeverity? DefaultEffectiveSeverity);
+
+internal sealed class RuleMetadata
+{
+ public string Id { get; set; } = "";
+ public string Title { get; set; } = "";
+ public string HelpUrl { get; set; } = "";
+ public string Category { get; set; } = "";
+ public string DefaultSeverity { get; set; } = "";
+ public bool IsEnabledByDefault { get; set; }
+ public string Description { get; set; } = "";
+ public string PackageId { get; set; } = "";
+}
From 0d5cd42ec5188ba5e1b9a185428c6eb50a134e9c Mon Sep 17 00:00:00 2001
From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com>
Date: Wed, 15 Oct 2025 17:03:21 +0000
Subject: [PATCH 3/4] Add documentation and link to config tool from main
README
Co-authored-by: kfrancis <67574+kfrancis@users.noreply.github.com>
---
README.md | 13 ++
docs/config-tool/FUTURE_ENHANCEMENTS.md | 92 ++++++++++++++
docs/config-tool/USER_GUIDE.md | 156 ++++++++++++++++++++++++
docs/index.html | 57 +++++++++
4 files changed, 318 insertions(+)
create mode 100644 docs/config-tool/FUTURE_ENHANCEMENTS.md
create mode 100644 docs/config-tool/USER_GUIDE.md
create mode 100644 docs/index.html
diff --git a/README.md b/README.md
index 6bdc231..a39732f 100644
--- a/README.md
+++ b/README.md
@@ -22,6 +22,19 @@ If you are using [StyleCop.Analyzers](https://www.nuget.org/packages/StyleCop.An
If you also have a `Directory.Build.props` file in your solution, you can remove properties that are [already set by this package](src/buildTransitive/CSS.DotNet.CodingStandards.props).
+## 🔧 Interactive Rule Configuration Tool
+
+We provide an [interactive web-based configuration tool](https://clinical-support-systems.github.io/css-dotnet-codingstandards/config-tool/) that makes it easy to customize rules for your project:
+
+- **Browse all 500+ rules** with descriptions and help links
+- **Filter by category**: Style, Quality, Security, Performance
+- **Search** by rule ID, title, or description
+- **Adjust severities** interactively with live preview
+- **Apply templates** for different project types (API, Library, Blazor, Test)
+- **Export configuration** as a custom `.editorconfig` snippet
+
+This tool dramatically reduces adoption friction and makes customization accessible to all skill levels.
+
## What's included
- Code style and formatting options, including indentation, line wrapping, encoding, new lines preferences, and more.
diff --git a/docs/config-tool/FUTURE_ENHANCEMENTS.md b/docs/config-tool/FUTURE_ENHANCEMENTS.md
new file mode 100644
index 0000000..d42b26e
--- /dev/null
+++ b/docs/config-tool/FUTURE_ENHANCEMENTS.md
@@ -0,0 +1,92 @@
+# Future Enhancements
+
+This document outlines potential future enhancements for the Interactive Rule Configuration Tool.
+
+## Code Examples Database
+
+### Goal
+Provide code examples showing violations and fixes for each rule.
+
+### Implementation Plan
+1. Create a JSON database of code examples:
+ ```json
+ {
+ "CA1000": {
+ "violation": "public class Generic { public static void Method() { } }",
+ "fix": "public class Generic { public void Method() { } }",
+ "explanation": "Avoid static members on generic types as they require type arguments"
+ }
+ }
+ ```
+
+2. Extend the UI to show examples when expanding a rule
+3. Add syntax highlighting for code blocks
+4. Source examples from:
+ - Microsoft documentation
+ - StyleCop documentation
+ - Community contributions
+
+### Benefits
+- Faster understanding of rule violations
+- Visual learning for developers
+- Reduced time to fix issues
+
+## Configuration Diff Viewer
+
+### Goal
+Show visual differences between selected template and current configuration.
+
+### Implementation Plan
+1. Add a "Compare" mode to the UI
+2. Highlight rules that differ from defaults
+3. Show side-by-side comparison of severities
+4. Export diff as a readable report
+
+### Benefits
+- Understand impact of template selection
+- Review changes before applying
+- Document configuration decisions
+
+## Advanced Features
+
+### Rule Dependencies
+- Show rules that commonly work together
+- Suggest related rules when modifying one
+- Group rules by semantic purpose
+
+### Import Existing Configuration
+- Allow users to upload their current `.editorconfig`
+- Parse and display current settings
+- Suggest optimizations or updates
+
+### Team Presets
+- Save and share custom templates
+- Version control for configurations
+- Team collaboration features
+
+### Analytics
+- Most commonly modified rules
+- Popular template choices
+- Configuration patterns by project type
+
+### Integration
+- VS Code extension
+- Visual Studio extension
+- CLI tool for automation
+- GitHub Action for validation
+
+## Contributing
+
+If you'd like to contribute to any of these enhancements:
+1. Open an issue to discuss the feature
+2. Submit a PR with your implementation
+3. Update documentation
+
+## Priority
+
+Current priorities:
+1. ✅ Core configuration tool (completed)
+2. 🔄 Code examples database (in progress)
+3. 📋 Configuration diff viewer (planned)
+4. 🎯 Import existing configuration (planned)
+5. 🤝 Team presets (future)
diff --git a/docs/config-tool/USER_GUIDE.md b/docs/config-tool/USER_GUIDE.md
new file mode 100644
index 0000000..0529791
--- /dev/null
+++ b/docs/config-tool/USER_GUIDE.md
@@ -0,0 +1,156 @@
+# Interactive Rule Configuration Tool - User Guide
+
+## Overview
+
+The Interactive Rule Configuration Tool is a web-based application that helps developers customize CSS .NET Coding Standards for their projects without manually editing `.editorconfig` files.
+
+## Features
+
+### 🎯 Browse All Rules
+- View all 2046+ analyzer rules from multiple packages
+- Each rule includes:
+ - Rule ID (e.g., CA1000, IDE0055)
+ - Title and description
+ - Category (Style, Quality, Security, Performance, Other)
+ - Default severity level
+ - Link to official documentation
+ - Source package information
+
+### 🔍 Advanced Filtering
+- **Search**: Find rules by ID, title, or description
+- **Category Filter**: Show only rules from specific categories
+- **Severity Filter**: Filter by current severity level
+- **Pagination**: Navigate through rules efficiently (50 per page)
+
+### 📋 Project Templates
+Apply pre-configured rule sets optimized for different project types:
+
+- **Default**: All rules as configured in the base package
+- **API Project**: Enhanced security rules for Web API projects
+- **Library**: Stricter quality rules for class libraries
+- **Blazor**: Optimized for Blazor applications
+- **Test Project**: Relaxed rules for test projects
+
+### ⚙️ Interactive Configuration
+- Adjust severity for any rule with a dropdown selector:
+ - **none**: Rule is disabled
+ - **silent**: Enabled but no diagnostics
+ - **suggestion**: IDE suggestion (green squiggle)
+ - **warning**: Warning (yellow squiggle)
+ - **error**: Error (red squiggle)
+- Color-coded severity indicators for easy identification
+- Track how many rules you've modified
+
+### 💾 Export Configuration
+- Generate a custom `.editorconfig` file with your changes
+- Download includes:
+ - Header with template information
+ - Generation timestamp
+ - Only modified rules (unchanged rules use defaults)
+ - Comments with rule titles
+
+## How to Use
+
+### Step 1: Access the Tool
+Visit: https://clinical-support-systems.github.io/css-dotnet-codingstandards/config-tool/
+
+### Step 2: Choose a Template (Optional)
+If you're starting from scratch, select a project template that matches your project type. This will apply sensible defaults.
+
+### Step 3: Browse and Filter Rules
+Use the search box and filters to find rules you want to customize:
+- Search for specific rule IDs (e.g., "CA1000")
+- Filter by category (Style, Quality, Security, Performance)
+- Filter by severity level
+
+### Step 4: Adjust Severities
+Click on the severity dropdown for any rule and select your preferred level. The tool will track your changes.
+
+### Step 5: Export Configuration
+Click the "Export Configuration" button at the bottom right to download your custom `.editorconfig` file.
+
+### Step 6: Apply to Your Project
+1. Open the downloaded `.editorconfig` file
+2. Copy the contents
+3. Paste into your project's `.editorconfig` file (or create one if it doesn't exist)
+4. Commit the changes
+
+## Statistics Dashboard
+
+The tool displays real-time statistics:
+- **Filtered Rules**: Number of rules matching your current filters
+- **Modified Rules**: Number of rules you've customized
+- **Category Counts**: Distribution of rules by category
+
+## Examples
+
+### Example 1: Relax Styling Rules for Test Projects
+1. Select "Test Project" template
+2. Search for "style" category
+3. Note that many style rules are set to "silent"
+4. Export and apply to your test project
+
+### Example 2: Enhance Security for API Projects
+1. Select "API Project" template
+2. Filter by "Security" category
+3. Note that security rules are elevated to "error"
+4. Export and apply to your API project
+
+### Example 3: Custom Configuration
+1. Start with "Default" template
+2. Search for "CA1031" (Do not catch general exception types)
+3. Change severity from "none" to "warning"
+4. Search for "IDE0055" (Fix formatting)
+5. Change severity from "error" to "warning"
+6. Export your custom configuration
+
+## Tips
+
+- **Start with a template**: Templates provide sensible defaults for common scenarios
+- **Use search effectively**: Search by rule ID when you know what you're looking for
+- **Read descriptions**: Click documentation links to understand what each rule does
+- **Test incrementally**: Apply changes gradually and test your build
+- **Document your choices**: Add comments in your `.editorconfig` explaining why rules were modified
+
+## Technical Details
+
+### Data Source
+Rule metadata is automatically generated from:
+- Microsoft.CodeAnalysis.NetAnalyzers
+- Microsoft.CodeAnalysis.CSharp.CodeStyle
+- StyleCop.Analyzers
+- Meziantou.Analyzer
+- Microsoft.CodeAnalysis.BannedApiAnalyzers
+
+### Updates
+The rules metadata is regenerated with each package release, ensuring you always have the latest rule information.
+
+### Browser Compatibility
+The tool uses modern web technologies and works best with:
+- Chrome/Edge (latest)
+- Firefox (latest)
+- Safari (latest)
+
+## Troubleshooting
+
+### No rules showing
+- Check your internet connection
+- Try refreshing the page
+- Clear browser cache if needed
+
+### Export not working
+- Check that JavaScript is enabled
+- Try a different browser
+- Check for browser extensions that might block downloads
+
+### Can't find a specific rule
+- Use the search feature with the rule ID
+- Check if you have any filters applied
+- Some rules may be deprecated or renamed
+
+## Support
+
+For issues or questions:
+- Check the [main repository](https://github.com/Clinical-Support-Systems/css-dotnet-codingstandards)
+- Review the [package documentation](https://www.nuget.org/packages/CSS.DotNet.CodingStandards/)
+- Search existing issues or create a new one
diff --git a/docs/index.html b/docs/index.html
new file mode 100644
index 0000000..c32946b
--- /dev/null
+++ b/docs/index.html
@@ -0,0 +1,57 @@
+
+
+
+
+
+
+ CSS .NET Coding Standards - Documentation
+
+
+
+
+
+
From 3d6f018692c35175985cb3f13e0a0952ee69a3f7 Mon Sep 17 00:00:00 2001
From: Kori Francis
Date: Wed, 15 Oct 2025 13:16:48 -0400
Subject: [PATCH 4/4] Update global.json
---
global.json | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/global.json b/global.json
index 645374b..8b1b397 100644
--- a/global.json
+++ b/global.json
@@ -1,7 +1,7 @@
{
"sdk": {
"version": "9.0.303",
- "rollForward": "latestMinor",
+ "rollForward": "latestPatch",
"allowPrerelease": false
}
}