Java is a language that has been designed from the beginning with security in mind. [5] It is implemented with the Sandbox model in order to limit the privileges of running code. The language has been designed to prevent major security errors such as buffer overflows. Numerous precautions have been made to ensure that java is a truly mobile secure language. A detailed description of the java security model can be found at [13] & [16]. With this in mind there are still many steps that a programmer can take in order to further secure their own code. This is done to protect proprietary code and to prevent their application from being used in an attack to escalate privileges. The process of producing secure java code is examined in [3]. This is further reduced to a paper on twelve basic rules for more secure java code. [2] In the following section a more detailed look at these twelve principals as well as a few additional ones is provided. While JSS does not currently scan for all of these security bugs, external visitors can be implemented to do so.