Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libomxcamera-0.1/src/library_entry_point.c
Examining data/libomxcamera-0.1/src/omx_camera_source_component.h
Examining data/libomxcamera-0.1/src/omx_camera_source_component.c

FINAL RESULTS:

data/libomxcamera-0.1/src/omx_camera_source_component.c:1025:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy( (char*) pComponentRole->cRole, CAMERA_COMP_ROLE);
data/libomxcamera-0.1/src/omx_camera_source_component.c:394:48:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  omx_camera_source_component_Private->fdCam = open(V4L2DEV_FILENAME, O_RDWR  | O_NONBLOCK, 0);
data/libomxcamera-0.1/src/omx_camera_source_component.c:990:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ComponentParameterStructure,&omx_camera_source_component_Private->sPortTypesParam[OMX_PortDomainVideo],sizeof(OMX_PORT_PARAM_TYPE));
data/libomxcamera-0.1/src/omx_camera_source_component.c:1017:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pSensorMode, &omx_camera_source_component_Private->sSensorMode, sizeof(OMX_PARAM_SENSORMODETYPE));
data/libomxcamera-0.1/src/omx_camera_source_component.c:1072:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&omx_camera_source_component_Private->sPortTypesParam[OMX_PortDomainVideo],ComponentParameterStructure,sizeof(OMX_PORT_PARAM_TYPE));
data/libomxcamera-0.1/src/omx_camera_source_component.c:1094:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pPort->sPortParam, pPortDef, sizeof(OMX_PARAM_PORTDEFINITIONTYPE));
data/libomxcamera-0.1/src/omx_camera_source_component.c:1127:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&omx_camera_source_component_Private->sSensorMode, pSensorMode, sizeof(OMX_PARAM_SENSORMODETYPE));
data/libomxcamera-0.1/src/omx_camera_source_component.c:1792:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pDstFrameAddr, pSrcFrameAddr, camera_CalculateBufferSize(nSrcFrameWidth, nSrcFrameHeight, eSrcOmxColorFormat));
data/libomxcamera-0.1/src/library_entry_point.c:68:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(stComponents[0]->name, "OMX.st.v4l.camera_source", OMX_MAX_STRINGNAME_SIZE);
data/libomxcamera-0.1/src/library_entry_point.c:87:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(stComponents[0]->name_specific[0], "OMX.st.v4l.camera_source", OMX_MAX_STRINGNAME_SIZE);
data/libomxcamera-0.1/src/library_entry_point.c:105:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(stComponents[0]->role_specific[0], "v4l.camera_source", OMX_MAX_STRINGNAME_SIZE);

ANALYSIS SUMMARY:

Hits = 11
Lines analyzed = 2307 in approximately 0.09 seconds (26156 lines/second)
Physical Source Lines of Code (SLOC) = 1645
Hits@level = [0]   0 [1]   3 [2]   7 [3]   0 [4]   1 [5]   0
Hits@level+ = [0+]  11 [1+]  11 [2+]   8 [3+]   1 [4+]   1 [5+]   0
Hits/KSLOC@level+ = [0+] 6.68693 [1+] 6.68693 [2+] 4.86322 [3+] 0.607903 [4+] 0.607903 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.