Transparency visibility must be preserved between overriding methods and the methods that are being overridden. If the virtual method being overridden or interface method being implemented is security safe-critical or security transparent, then the overriding method must also be either security safe-critical or security transparent. Similarly, if the method being overridden is security critical, the overriding method must be security critical.
Transition '{0}' of state '{1}' is an unconditional transition. It may not share the same trigger '{2}' with other transition(s). ...
Transition into COM context 1$x for this RuntimeCallableWrapper failed with the following error: %2$s. This is typically ...
Transition into COM context 1$x for this RuntimeCallableWrapper failed with the following error: %2$s. This is typically ...
Transparency attributes are applied from larger scopes inward. For instance, if a type is marked as entirely security critical, ...
Transparency visibility must be preserved between overriding methods and the methods that are being overridden. If the virtual ...
Transparent code cannot refer to security critical methods, types, or fields. At runtime these references will result in ...
Transparent code may not call native code directly. This rule looks for any transparent code which calls a method stub (such ...
Transparent code may not use security asserts, since asserting permissions can result in elevating the effective permissions ...
Transparent code must be fully verifiable. This rule looks for any use of pointer types to check for unverifiable code, however ...