Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/libdivide-3.0/doc/divide_by_constants_codegen_reference.c Examining data/libdivide-3.0/libdivide.h Examining data/libdivide-3.0/test/benchmark.c Examining data/libdivide-3.0/test/benchmark_branchfree.cpp Examining data/libdivide-3.0/test/tester.cpp FINAL RESULTS: data/libdivide-3.0/test/benchmark.c:717:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(input_buff, "%" PRIu64, d); data/libdivide-3.0/test/benchmark.c:729:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(input_buff, "%" PRId64, d); data/libdivide-3.0/test/benchmark.c:802:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned) time(NULL)); data/libdivide-3.0/test/benchmark.c:689:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buff[32]; data/libdivide-3.0/test/benchmark.c:690:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(input_buff, "%u", d); data/libdivide-3.0/test/benchmark.c:701:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buff[32]; data/libdivide-3.0/test/benchmark.c:702:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(input_buff, "%d", d); data/libdivide-3.0/test/benchmark.c:716:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buff[32]; data/libdivide-3.0/test/benchmark.c:728:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buff[32]; data/libdivide-3.0/test/tester.cpp:118:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem[16 * sizeof(T) + 64]; data/libdivide-3.0/test/tester.cpp:222:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem[16 * sizeof(T) + 64]; ANALYSIS SUMMARY: Hits = 11 Lines analyzed = 3776 in approximately 0.12 seconds (31660 lines/second) Physical Source Lines of Code (SLOC) = 2699 Hits@level = [0] 11 [1] 0 [2] 8 [3] 1 [4] 2 [5] 0 Hits@level+ = [0+] 22 [1+] 11 [2+] 11 [3+] 3 [4+] 2 [5+] 0 Hits/KSLOC@level+ = [0+] 8.15117 [1+] 4.07558 [2+] 4.07558 [3+] 1.11152 [4+] 0.741015 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.