Reports classes which may be serialized or deserialized. A class may be serialized if it supports the Serializable interface, and its readObject() and writeObject() methods are not defined to always throw an exception. Serializable classes may be dangerous in code intended for secure use.

Use the table below to specify what specific classes and their inheritors should be excluded from being checked by this inspection. This is meant for those classes which, although they inherit Serializable from a superclass, are not intended for serialization. Such classes would lead this inspection to report unnecessarily.
Note that it may be more secure to add readObject() and writeObject() methods which always throw an exception, instead.

Use the checkbox below to ignore Serializable anonymous classes.

New in 2017.3