Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/amb-plugins-0.8.1/ambisonic0.cc
Examining data/amb-plugins-0.8.1/ambisonic0.h
Examining data/amb-plugins-0.8.1/allpass.cc
Examining data/amb-plugins-0.8.1/ambisonic1.cc
Examining data/amb-plugins-0.8.1/ambisonic1.h
Examining data/amb-plugins-0.8.1/ambisonic2.cc
Examining data/amb-plugins-0.8.1/ambisonic2.h
Examining data/amb-plugins-0.8.1/ambisonic3.cc
Examining data/amb-plugins-0.8.1/ambisonic3.h
Examining data/amb-plugins-0.8.1/filter1.cc
Examining data/amb-plugins-0.8.1/filter1.h
Examining data/amb-plugins-0.8.1/ladspa.h
Examining data/amb-plugins-0.8.1/ladspaplugin.h
Examining data/amb-plugins-0.8.1/virtmic.cc
Examining data/amb-plugins-0.8.1/virtmic.h
Examining data/amb-plugins-0.8.1/allpass.h
Examining data/amb-plugins-0.8.1/ambisonic0_if.cc
Examining data/amb-plugins-0.8.1/ambisonic1_if.cc
Examining data/amb-plugins-0.8.1/ambisonic2_if.cc
Examining data/amb-plugins-0.8.1/ambisonic3_if.cc

FINAL RESULTS:

data/amb-plugins-0.8.1/ambisonic0_if.cc:98:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname0 [Ladspa_Tricard2amb::NPORT] = 
data/amb-plugins-0.8.1/ambisonic0_if.cc:148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname1 [Ladspa_Virtualmic::NPORT] = 
data/amb-plugins-0.8.1/ambisonic0_if.cc:200:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname2 [Ladspa_UHJ_encoder::NPORT] = 
data/amb-plugins-0.8.1/ambisonic0_if.cc:244:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname3 [Ladspa_UHJ_decoder::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1.cc:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic1.cc:187:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic1_if.cc:98:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname0 [Ladspa_Monopan11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1_if.cc:147:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname1 [Ladspa_Stereopan11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1_if.cc:200:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname2 [Ladspa_Rotator11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1_if.cc:258:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname3 [Ladspa_SquareDec11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1_if.cc:328:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname4 [Ladspa_HexaDec11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic1_if.cc:403:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname5 [Ladspa_CubeDec11::NPORT] = 
data/amb-plugins-0.8.1/ambisonic2.cc:132:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic2.cc:133:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic2.cc:299:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic2.cc:300:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic2.cc:301:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_R], _port [INP_R], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic2_if.cc:100:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname0 [Ladspa_Monopan21::NPORT] = 
data/amb-plugins-0.8.1/ambisonic2_if.cc:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname1 [Ladspa_Rotator21::NPORT] = 
data/amb-plugins-0.8.1/ambisonic2_if.cc:221:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname2 [Ladspa_Monopan22::NPORT] = 
data/amb-plugins-0.8.1/ambisonic2_if.cc:290:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname3 [Ladspa_Rotator22::NPORT] = 
data/amb-plugins-0.8.1/ambisonic3.cc:154:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic3.cc:155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float));
data/amb-plugins-0.8.1/ambisonic3.cc:395:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_W], _port [INP_W], len * sizeof (LADSPA_Data));
data/amb-plugins-0.8.1/ambisonic3.cc:396:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (LADSPA_Data));
data/amb-plugins-0.8.1/ambisonic3.cc:397:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_R], _port [INP_R], len * sizeof (LADSPA_Data));
data/amb-plugins-0.8.1/ambisonic3.cc:398:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (_port [OUT_K], _port [INP_K], len * sizeof (LADSPA_Data));
data/amb-plugins-0.8.1/ambisonic3_if.cc:104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname0 [Ladspa_Monopan31::NPORT] = 
data/amb-plugins-0.8.1/ambisonic3_if.cc:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname1 [Ladspa_Rotator31::NPORT] = 
data/amb-plugins-0.8.1/ambisonic3_if.cc:238:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname2 [Ladspa_Monopan33::NPORT] = 
data/amb-plugins-0.8.1/ambisonic3_if.cc:323:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const pname3 [Ladspa_Rotator33::NPORT] = 

ANALYSIS SUMMARY:

Hits = 31
Lines analyzed = 5372 in approximately 0.12 seconds (43260 lines/second)
Physical Source Lines of Code (SLOC) = 3628
Hits@level = [0]   0 [1]   0 [2]  31 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]  31 [1+]  31 [2+]  31 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 8.54465 [1+] 8.54465 [2+] 8.54465 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.