Skip to content

Embold includes a comprehensive set of C/C++ security checks based on CWE (Common Weakness Enumeration) standards. These rules help identify vulnerabilities such as buffer overflows, memory management errors, use-after-free, null pointer dereferences, race conditions, and more — directly in your codebase.

The full and always up-to-date list of supported C/C++ CWE rules, along with rules for all other languages and tags, is maintained on the Embold Rules Portal. The portal lets you filter by language, CWE tag, severity, and other categories so you always see the latest rule count and details.

View C/C++ CWE rules on the Embold Rules Portal →

For a step-by-step guide on how to browse and filter rules on the portal, see How to use the Embold Rules Portal.