Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/chrootuid-1.3/chrootuid.c

FINAL RESULTS:

data/chrootuid-1.3/chrootuid.c:180:12:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    (void) execv(argv[3+optstart], argv + 3+optstart);
data/chrootuid-1.3/chrootuid.c:144:9:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
    if (chroot(argv[1+optstart])) {

ANALYSIS SUMMARY:

Hits = 2
Lines analyzed = 187 in approximately 0.06 seconds (2940 lines/second)
Physical Source Lines of Code (SLOC) = 102
Hits@level = [0]  16 [1]   0 [2]   0 [3]   1 [4]   1 [5]   0
Hits@level+ = [0+]  18 [1+]   2 [2+]   2 [3+]   2 [4+]   1 [5+]   0
Hits/KSLOC@level+ = [0+] 176.471 [1+] 19.6078 [2+] 19.6078 [3+] 19.6078 [4+] 9.80392 [5+]   0
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.