Software Alternatives & Reviews

Error Prone VS Cppcheck

Compare Error Prone VS Cppcheck and see what are their differences

Error Prone logo Error Prone

Error Prone is a bug detection tool for Java code, integrated into the Java compiler.

Cppcheck logo Cppcheck

Cppcheck is an analysis tool for C/C++ code. It detects the types of bugs that the compilers normally fail to detect. The goal is no false positives. CppCheckDownload cppcheck for free.
  • Error Prone Landing page
    Landing page //
    2021-09-25
  • Cppcheck Landing page
    Landing page //
    2021-10-13

Error Prone videos

Error prone PCR

Cppcheck videos

Cppcheck

More videos:

  • Review - Daniel Marjamäki: Cppcheck, static code analysis

Category Popularity

0-100% (relative to Error Prone and Cppcheck)
Code Analysis
21 21%
79% 79
Code Review
27 27%
73% 73
Code Coverage
21 21%
79% 79
Text Editors
100 100%
0% 0

User comments

Share your experience with using Error Prone and Cppcheck. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Error Prone and Cppcheck

Error Prone Reviews

We have no reviews of Error Prone yet.
Be the first one to post

Cppcheck Reviews

Top 9 C++ Static Code Analysis Tools
Cppcheck is a popular, open-source, free, cross-platform static code analysis tool dedicated to C and C++. It is known for being easy to use and its simplicity is one of its pros. To get started with it you don’t have to do any adjustments or modifications, which is why it’s often recommended for beginners. It also has a reputation of reporting a relatively small number of...

Social recommendations and mentions

Based on our record, Cppcheck should be more popular than Error Prone. It has been mentiond 10 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Error Prone mentions (4)

  • How to use Java Records
    A special kind of validation is enforcing that record fields are not null. (Un)fortunately, records do not have any special behavior regarding nullability. You can use tools like NullAway or Error Prone to prevent null in your code in general, or you can add checks to your records:. - Source: dev.to / over 1 year ago
  • Why is `suspend` a language keyword, but @Composable and @Serializable are annotations
    I am all in favour to more third side libraries adding functionalities, like Lombok, Manifold and error prone. As well as smaller projects like this shameless plug and what appears in this list. Source: over 1 year ago
  • Is there a tool to track CVEs for the software that we use?
    While at it you could also point them to static code analyzers such as error_prone, spotbugs and pmd (use all 3 at once - they complement each other in detecting different issues). Source: over 2 years ago
  • Get rid of those boolean function parameters (2015)
    Linters can check for this sort of thing, for example Error Prone[0] has a lint[1] for this. Totally agree this is better to be in the language proper so we don't need this extra tooling. [0]: https://errorprone.info [1]: https://errorprone.info/bugpattern/ParameterName. - Source: Hacker News / over 2 years ago

Cppcheck mentions (10)

  • Configuring Cppcheck, Cpplint, and JSON Lint
    I dedicated Sunday morning to going over the documentation of the linters we use in the project. The goal was to understand all options and use them in the best way for our project. Seeing their manuals side by side was nice because even very similar things are solved differently. Cppcheck is the most configurable and best documented; JSON Lint lies at the other end. - Source: dev.to / about 2 months ago
  • Enforcing Memory Safety?
    Using infer, someone else exploited null-dereference checks to introduce simple affine types in C++. Cppcheck also checks for null-dereferences. Unfortunately, that approach means that borrow-counting references have a larger sizeof than non-borrow counting references, so optimizing the count away potentially changes the semantics of a program which introduces a whole new way of writing subtly wrong code. Source: 11 months ago
  • Static Code analysis
    For my own projects, I used cppcheck. You can check out that tool to get a feel. Depending on what industry your in, you might need to follow a standard like Misra. Source: about 1 year ago
  • How do you not shoot yourself in the foot ?
    Https://cppcheck.sourceforge.io/ (there are many other static analysis tools, I just haven't used them or didn't care for them). Source: about 1 year ago
  • Linting tool for prohibiting the use of specific std types
    Sounds like something that could simply be communicated with the team that writes the tests. Unless you have dozens of such classes. In that case, you could just use e.g. Cppcheck and add a rule (regular expression) that searches for usages of the forbidden classes. Source: over 1 year ago
View more

What are some alternatives?

When comparing Error Prone and Cppcheck, you can also consider the following products

Sublime Web Inspector - Sublime Web Inspector enables users to debug Javascript right in the Sublime Text editor.

SonarQube - SonarQube, a core component of the Sonar solution, is an open source, self-managed tool that systematically helps developers and organizations deliver Clean Code.

netquery - netquery is the system introspection tool.

Clang Static Analyzer - The Clang Static Analyzer is a source code analysis tool that finds bugs in C, C++, and Objective-C...

FusionDebug - FusionDebug an interactive step debugger for ColdFusion Markup Language.

Coverity Scan - Find and fix defects in your Java, C/C++ or C# open source project for free