Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/iml-1.0.4/examples/exam-nullspace.c
Examining data/iml-1.0.4/examples/exam-certsolve.c
Examining data/iml-1.0.4/examples/exam-nonsingsolv.c
Examining data/iml-1.0.4/src/mtrans.c
Examining data/iml-1.0.4/src/RNSop.h
Examining data/iml-1.0.4/src/mtrans.h
Examining data/iml-1.0.4/src/certsolve.h
Examining data/iml-1.0.4/src/RNSop.c
Examining data/iml-1.0.4/src/nonsysolve.h
Examining data/iml-1.0.4/src/common.h
Examining data/iml-1.0.4/src/error.c
Examining data/iml-1.0.4/src/latreduce.c
Examining data/iml-1.0.4/src/nullspace.c
Examining data/iml-1.0.4/src/iml.h
Examining data/iml-1.0.4/src/basisop.h
Examining data/iml-1.0.4/src/basisop.c
Examining data/iml-1.0.4/src/nonsysolve.c
Examining data/iml-1.0.4/src/padiclift.c
Examining data/iml-1.0.4/src/reconsolu.c
Examining data/iml-1.0.4/src/latreduce.h
Examining data/iml-1.0.4/src/padiclift.h
Examining data/iml-1.0.4/src/reconsolu.h
Examining data/iml-1.0.4/src/error.h
Examining data/iml-1.0.4/src/certsolve.c
Examining data/iml-1.0.4/src/memalloc.c
Examining data/iml-1.0.4/src/nullspace.h
Examining data/iml-1.0.4/tests/test-smallentry.c
Examining data/iml-1.0.4/tests/test-largeentry.c
Examining data/iml-1.0.4/cblas.h

FINAL RESULTS:

data/iml-1.0.4/examples/exam-certsolve.c:178:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/examples/exam-certsolve.c:222:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/examples/exam-nonsingsolv.c:139:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/examples/exam-nonsingsolv.c:181:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/examples/exam-nullspace.c:113:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen ("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/src/basisop.c:162:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/src/basisop.c:233:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/tests/test-largeentry.c:270:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/tests/test-smallentry.c:292:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)
data/iml-1.0.4/tests/test-smallentry.c:409:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((devrandom = fopen("/dev/urandom", "r")) != NULL)

ANALYSIS SUMMARY:

Hits = 10
Lines analyzed = 12367 in approximately 0.42 seconds (29282 lines/second)
Physical Source Lines of Code (SLOC) = 6656
Hits@level = [0] 119 [1]   0 [2]  10 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+] 129 [1+]  10 [2+]  10 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 19.381 [1+] 1.5024 [2+] 1.5024 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.