Coding guidelines. For this approach
to be effective, it must ensure
developers never write application
code that directly calls potentially injection-
prone sinks, and that they instead
use the corresponding safe wrapper
API. Furthermore, it must ensure
uses of unchecked conversions are designed
with reviewability in mind, and
are in fact security reviewed. Both constraints
represent coding guidelines
with which all of an application’s code
base must comply.