Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/lemonbar-1.3/lemonbar.c

FINAL RESULTS:

data/lemonbar-1.3/lemonbar.c:1292:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ((ch = getopt(argc, argv, "hg:bdf:a:pu:B:F:U:n:")) != -1) {
data/lemonbar-1.3/lemonbar.c:702:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret->width_lut, xcb_query_font_char_infos(font_info), lut_size);
data/lemonbar-1.3/lemonbar.c:1269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char input[4096] = {0, };
data/lemonbar-1.3/lemonbar.c:677:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cookie = xcb_open_font_checked(c, font, strlen(pattern), pattern);
data/lemonbar-1.3/lemonbar.c:743:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        atom_cookie[i] = xcb_intern_atom(c, 0, strlen(atom_names[i]), atom_names[i]);
data/lemonbar-1.3/lemonbar.c:1215:110:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            xcb_change_property(c, XCB_PROP_MODE_REPLACE, mon->window, XCB_ATOM_WM_NAME, XCB_ATOM_STRING, 8 ,strlen(wm_name), wm_name);
data/lemonbar-1.3/lemonbar.c:1385:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    (void)write(STDOUT_FILENO, area->cmd, strlen(area->cmd));

ANALYSIS SUMMARY:

Hits = 7
Lines analyzed = 1407 in approximately 0.11 seconds (12621 lines/second)
Physical Source Lines of Code (SLOC) = 1065
Hits@level = [0]  22 [1]   4 [2]   2 [3]   1 [4]   0 [5]   0
Hits@level+ = [0+]  29 [1+]   7 [2+]   3 [3+]   1 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 27.23 [1+] 6.57277 [2+] 2.8169 [3+] 0.938967 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.