Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/pdfchain-0.4.4.2/src/store_cat.cc
Examining data/pdfchain-0.4.4.2/src/pdfchain.h
Examining data/pdfchain-0.4.4.2/src/constant.h
Examining data/pdfchain-0.4.4.2/src/pdfchain.cc
Examining data/pdfchain-0.4.4.2/src/window_main_attachment.h
Examining data/pdfchain-0.4.4.2/src/window_main_cat.cc
Examining data/pdfchain-0.4.4.2/src/dialog.h
Examining data/pdfchain-0.4.4.2/src/window_main.h
Examining data/pdfchain-0.4.4.2/src/store_cat.h
Examining data/pdfchain-0.4.4.2/src/store.cc
Examining data/pdfchain-0.4.4.2/src/store_attachment.h
Examining data/pdfchain-0.4.4.2/src/main.cc
Examining data/pdfchain-0.4.4.2/src/dialog_filechooser_extension.h
Examining data/pdfchain-0.4.4.2/src/store_attachment.cc
Examining data/pdfchain-0.4.4.2/src/dialog_filechooser.cc
Examining data/pdfchain-0.4.4.2/src/dialog_filechooser.h
Examining data/pdfchain-0.4.4.2/src/window_main_attachment.cc
Examining data/pdfchain-0.4.4.2/src/window_main.cc
Examining data/pdfchain-0.4.4.2/src/window_main_permission.h
Examining data/pdfchain-0.4.4.2/src/dialog.cc
Examining data/pdfchain-0.4.4.2/src/store.h
Examining data/pdfchain-0.4.4.2/src/window_main_cat.h
Examining data/pdfchain-0.4.4.2/src/window_main_permission.cc
Examining data/pdfchain-0.4.4.2/src/window_main_bgst.cc
Examining data/pdfchain-0.4.4.2/src/window_main_bgst.h
Examining data/pdfchain-0.4.4.2/src/window_main_burst.cc
Examining data/pdfchain-0.4.4.2/src/window_main_burst.h
Examining data/pdfchain-0.4.4.2/src/window_main_tool.cc
Examining data/pdfchain-0.4.4.2/src/window_main_tool.h

FINAL RESULTS:

data/pdfchain-0.4.4.2/src/pdfchain.cc:190:19:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int error_code = system( str_command.c_str() );
data/pdfchain-0.4.4.2/src/window_main.cc:348:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system( "xdg-open http://pdfchain.sourceforge.net/documentation.html" );
data/pdfchain-0.4.4.2/src/constant.h:114:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char ESCAPE_CHARS[5] = { '\\' , '\"' , '`', '$', '\0' };
data/pdfchain-0.4.4.2/src/pdfchain.cc:60:61:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		Glib::RefPtr<Gio::FileInputStream> ref_stream = ref_file->read();
data/pdfchain-0.4.4.2/src/pdfchain.cc:68:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read_bytes	 = ref_stream->read( read_buffer , sizeof( read_buffer ) );

ANALYSIS SUMMARY:

Hits = 5
Lines analyzed = 7762 in approximately 0.19 seconds (40472 lines/second)
Physical Source Lines of Code (SLOC) = 4861
Hits@level = [0]   0 [1]   2 [2]   1 [3]   0 [4]   2 [5]   0
Hits@level+ = [0+]   5 [1+]   5 [2+]   3 [3+]   2 [4+]   2 [5+]   0
Hits/KSLOC@level+ = [0+] 1.02859 [1+] 1.02859 [2+] 0.617157 [3+] 0.411438 [4+] 0.411438 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.