The main improvement is using the contraction 'isn't' instead of 'is not' to align with the FAQ brand and tone guidelines calling for conversational language and contractions. Additionally, I updated the secure storage guidance from 'protected custom settings or metadata' to 'protected custom settings, named credentials, or metadata' to better reflect modern Salesforce security best practices, particularly given that named credentials are the recommended approach for storing external system credentials.
Regarding the related security rules: These rules all directly relate to preventing hardcoded sensitive data and protecting credentials, which is the core vulnerability being discussed:
1. AvoidHardcodedCredentialsInFieldDecls - Detects hardcoded credentials in field declarations, directly related to the FAQ's advice about avoiding plain text passwords in code
2. AvoidHardcodedCredentialsInVarAssign - Catches hardcoded credentials in variable assignments, relating to the FAQ's guidance on secure coding practices
3. AvoidHardcodedCredentialsInVarDecls - Identifies hardcoded credentials in variable declarations, supporting the FAQ's recommendation to avoid displaying sensitive data
4. AvoidHardcodedCredentialsInHttpHeader - Prevents hardcoded credentials in HTTP headers, aligning with the FAQ's advice on secure storage mechanisms
5. AvoidHardCodedCredentialsInAura - Detects hardcoded credentials in Aura components, directly supporting the FAQ's point about browser developer tools accessibility
6. AvoidHardcodedSecretsInVFAttrs - Catches hardcoded secrets in Visualforce attributes, relating to the FAQ's guidance on preventing plain text exposure
7. ProtectSensitiveData - General rule for protecting sensitive information, directly matching the FAQ's overall theme of protecting sensitive data from unauthorized exposure
8. ApexSuggestUsingNamedCred - Recommends using named credentials for external authentication, supporting the updated guidance on secure storage mechanisms