


Ten guides to becoming a top programmer to help you write programming code like NASA!
Introduction | Introduction: Do you know how NASA’s top programmers write mission-critical code? To ensure that code is clearer, safer, and easier to understand, NASA's Jet Propulsion Laboratory has developed 10 coding rules. |
The developer job at NASA is one of the most challenging in the programming world. Their primary focus is writing code and developing secure, mission-critical applications. For this reason, adhering to strict coding rules becomes crucial. These rules cover many aspects of software development, including coding style, use of language features, etc. Although it is difficult to agree on an appropriate coding standard, NASA's Jet Propulsion Laboratory (JPL) follows a set of coding rules called Powers of Ten: Rules for Developing Secure Critical Code.
These rules are primarily intended for programs written in C, because JPL has long used C. However, these rules can be easily applied to other programming languages as well. These coding rules were developed by Gerard J. Holzmann, JPL's chief scientist, primarily to ensure security.
NASA’s 10 Rules for Writing Mission-Critical Code:
- Restrict all code to extremely simple control flow structures - no goto statements, setjmp or longjmp structures, no indirect or direct recursive calls.
- All loops must have a fixed upper limit. It must be statically confirmed by a detection tool that the loop cannot reach the preset iteration upper limit. If this upper limit cannot be statically proven, then this principle can be considered violated.
- Do not use dynamic memory allocation after initialization.
- If you refer to the standard format of one statement per line and one declaration per line, then the length of the function should not be longer than a piece of paper. Typically this means no more than 60 lines of code per function.
- The density of assertions in the code averages as low as 2 assertions per function. Assertions are used to detect situations that are unlikely to occur in actual execution. Assertions must have no side effects and should be defined as boolean tests. When an assertion fails, an explicit recovery action should be performed, such as returning an error condition to the caller of the function that failed the assertion. For static tools, any assertion that can be proven by the static tool to never fail or never fire violates this rule (for example, it is impossible to satisfy this rule by adding useless assert(true) statements).
- Data objects must be declared in the smallest scope.
- The return value of a non-void function must be checked every time the function is called, and the validity of its parameters must be checked within each function.
- The use of preprocessors is limited to including header files and simple macro definitions. Symbol splicing, variadic argument lists (ellipses), and recursive macro calls are not allowed. All macros must be expandable into complete syntax units. The use of conditional compilation directives is often obscure, but not always avoidable. This means that even in a large software development more than one or two conditional compilation directives need to have good reasons, beyond the standard practice of avoiding including header files multiple times. Every time you do this in your code it must be flagged by a tool-based checker, and for good reason.
- The use of pointers should be restricted. In particular there should be no more than one level of pointer dereferencing. Pointer dereferencing operations cannot be implicit in macro definitions or type declarations. Also, function pointers are not allowed.
- From the first day of development, the code must be compiled with the highest level warning option enabled by the compiler. Under this setting, the code must compile with zero warnings. Code must be checked with source code static analysis tools at least once or more per day and pass with zero warnings.
Regarding these rules, NASA has this to say:
These rules are like seat belts in a car. You may feel a little uncomfortable at first, but after a while it will become a habit and you can't imagine not using them.
About the Author:
Adarsh Verma is the co-founder of Fossbytes. He is a respected entrepreneur who has always kept a close eye on open source, technological breakthroughs and completeness. You can contact him by email — [email protected]
The above is the detailed content of Ten guides to becoming a top programmer to help you write programming code like NASA!. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

DeepSeek is a powerful intelligent search and analysis tool that provides two access methods: web version and official website. The web version is convenient and efficient, and can be used without installation; the official website provides comprehensive product information, download resources and support services. Whether individuals or corporate users, they can easily obtain and analyze massive data through DeepSeek to improve work efficiency, assist decision-making and promote innovation.

There are many ways to install DeepSeek, including: compile from source (for experienced developers) using precompiled packages (for Windows users) using Docker containers (for most convenient, no need to worry about compatibility) No matter which method you choose, Please read the official documents carefully and prepare them fully to avoid unnecessary trouble.

Ouyi OKX, the world's leading digital asset exchange, has now launched an official installation package to provide a safe and convenient trading experience. The OKX installation package of Ouyi does not need to be accessed through a browser. It can directly install independent applications on the device, creating a stable and efficient trading platform for users. The installation process is simple and easy to understand. Users only need to download the latest version of the installation package and follow the prompts to complete the installation step by step.

BITGet is a cryptocurrency exchange that provides a variety of trading services including spot trading, contract trading and derivatives. Founded in 2018, the exchange is headquartered in Singapore and is committed to providing users with a safe and reliable trading platform. BITGet offers a variety of trading pairs, including BTC/USDT, ETH/USDT and XRP/USDT. Additionally, the exchange has a reputation for security and liquidity and offers a variety of features such as premium order types, leveraged trading and 24/7 customer support.

Gate.io is a popular cryptocurrency exchange that users can use by downloading its installation package and installing it on their devices. The steps to obtain the installation package are as follows: Visit the official website of Gate.io, click "Download", select the corresponding operating system (Windows, Mac or Linux), and download the installation package to your computer. It is recommended to temporarily disable antivirus software or firewall during installation to ensure smooth installation. After completion, the user needs to create a Gate.io account to start using it.

Ouyi, also known as OKX, is a world-leading cryptocurrency trading platform. The article provides a download portal for Ouyi's official installation package, which facilitates users to install Ouyi client on different devices. This installation package supports Windows, Mac, Android and iOS systems. Users can choose the corresponding version to download according to their device type. After the installation is completed, users can register or log in to the Ouyi account, start trading cryptocurrencies and enjoy other services provided by the platform.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Causes and solutions for errors when using PECL to install extensions in Docker environment When using Docker environment, we often encounter some headaches...
