Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/plasma-integration-5.19.5/autotests/kdeplatformtheme_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/kfiledialogqml_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/khintssettings_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/kdirselectdialog_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/kdeplatformsystemtrayicon_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/kfontsettingsdata_unittest.cpp Examining data/plasma-integration-5.19.5/autotests/ksni_unittest.cpp Examining data/plasma-integration-5.19.5/tests/qfiledialogtest.cpp Examining data/plasma-integration-5.19.5/tests/systraymenuexclusiveactionstest.cpp Examining data/plasma-integration-5.19.5/tests/windowdecotest.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformtheme.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformfiledialogbase.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/qdbusmenubar_p.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformsystemtrayicon.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kfiletreeview.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kfontsettingsdata.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformfiledialoghelper.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/main.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/x11integration.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kdirselectdialog.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kfiletreeview_p.h Examining data/plasma-integration-5.19.5/src/platformtheme/kfontsettingsdata.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kwaylandintegration.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdirselectdialog_p.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformtheme.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformfiledialoghelper.h Examining data/plasma-integration-5.19.5/src/platformtheme/khintssettings.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformsystemtrayicon.h Examining data/plasma-integration-5.19.5/src/platformtheme/khintssettings.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/x11integration.h Examining data/plasma-integration-5.19.5/src/platformtheme/kdeplatformfiledialogbase_p.h Examining data/plasma-integration-5.19.5/src/platformtheme/qdbusmenubar.cpp Examining data/plasma-integration-5.19.5/src/platformtheme/kwaylandintegration.cpp FINAL RESULTS: data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:150:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tempFile.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:168:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tempFile.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:232:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dialog.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:247:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dialog.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:329:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tempFile.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:339:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dialog.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:372:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dialog.open(); data/plasma-integration-5.19.5/autotests/kfiledialog_unittest.cpp:385:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dialog.open(); data/plasma-integration-5.19.5/src/platformtheme/kdeplatformtheme.cpp:283:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return KStandardGuiItem::open().text(); data/plasma-integration-5.19.5/src/platformtheme/khintssettings.cpp:447:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file.open(); ANALYSIS SUMMARY: Hits = 10 Lines analyzed = 5893 in approximately 0.17 seconds (34110 lines/second) Physical Source Lines of Code (SLOC) = 4126 Hits@level = [0] 0 [1] 0 [2] 10 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 10 [1+] 10 [2+] 10 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 2.42365 [1+] 2.42365 [2+] 2.42365 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.