Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libquvi-scripts-0.9.20131130/tests/scan/scan_youtube.c
Examining data/libquvi-scripts-0.9.20131130/tests/scan/scan_vzaar.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/tests.h
Examining data/libquvi-scripts-0.9.20131130/tests/lib/slist.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/re.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/qp_test.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/qm_test.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/qs_test.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/env.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/fetch.c
Examining data/libquvi-scripts-0.9.20131130/tests/lib/qsub_test.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_publicsenat.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_ted.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_tapuz.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_cbsnews.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_myspass.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_youtube.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_vzaar.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_majestyc.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_theonion.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_senat.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_videobash.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_101greatgoals.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_charlierose.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_tagtele.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_canalplus.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_dorkly.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_collegehumor.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_tvlux.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_vimeo.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_audioboo.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_dailymotion.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_ina.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_arte.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_ardmediathek.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_lego.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_videa.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_soundcloud.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_liveleak.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_guardian.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_spiegel.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_metacafe.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_clipfish.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_sapo.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_gaskrank.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_1tvru.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_bikeradar.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_break.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_sevenload.c
Examining data/libquvi-scripts-0.9.20131130/tests/media/media_funnyordie.c
Examining data/libquvi-scripts-0.9.20131130/tests/subtitle/subtitle_youtube.c
Examining data/libquvi-scripts-0.9.20131130/tests/playlist/playlist_soundcloud.c
Examining data/libquvi-scripts-0.9.20131130/tests/playlist/playlist_youtube.c

FINAL RESULTS:

data/libquvi-scripts-0.9.20131130/tests/media/media_ardmediathek.c:109:22:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const gint32 n = g_random_int_range(0, g_slist_length(l));
data/libquvi-scripts-0.9.20131130/tests/media/media_arte.c:77:22:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const gint32 n = g_random_int_range(0, g_slist_length(l));
data/libquvi-scripts-0.9.20131130/tests/lib/fetch.c:67:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&(t->p[t->size]), p, rsize);
data/libquvi-scripts-0.9.20131130/tests/lib/env.c:33:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (s == NULL || strlen(s) == 0)
data/libquvi-scripts-0.9.20131130/tests/lib/env.c:73:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (e == NULL || strlen(e) == 0)
data/libquvi-scripts-0.9.20131130/tests/lib/env.c:89:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (e == NULL || strlen(e) == 0)
data/libquvi-scripts-0.9.20131130/tests/lib/qs_test.c:55:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      g_assert_cmpint(strlen(s), >, 0);
data/libquvi-scripts-0.9.20131130/tests/lib/tests.h:100:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(s), >, 0);\
data/libquvi-scripts-0.9.20131130/tests/lib/tests.h:164:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(s), >, 0);\
data/libquvi-scripts-0.9.20131130/tests/lib/tests.h:211:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(s), >, 0);\
data/libquvi-scripts-0.9.20131130/tests/subtitle/subtitle_youtube.c:71:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  g_assert_cmpint(strlen(quvi_subtitle_export_data(qse)), >, 4096);

ANALYSIS SUMMARY:

Hits = 11
Lines analyzed = 4524 in approximately 0.21 seconds (21424 lines/second)
Physical Source Lines of Code (SLOC) = 2587
Hits@level = [0]   0 [1]   8 [2]   1 [3]   2 [4]   0 [5]   0
Hits@level+ = [0+]  11 [1+]  11 [2+]   3 [3+]   2 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 4.25203 [1+] 4.25203 [2+] 1.15964 [3+] 0.773096 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.