Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/r-bioc-iranges-2.24.0/inst/include/IRanges_defines.h
Examining data/r-bioc-iranges-2.24.0/inst/include/IRanges_interface.h
Examining data/r-bioc-iranges-2.24.0/inst/include/_IRanges_stubs.c
Examining data/r-bioc-iranges-2.24.0/src/CompressedAtomicList_utils.c
Examining data/r-bioc-iranges-2.24.0/src/CompressedIRangesList_class.c
Examining data/r-bioc-iranges-2.24.0/src/CompressedList_class.c
Examining data/r-bioc-iranges-2.24.0/src/Grouping_class.c
Examining data/r-bioc-iranges-2.24.0/src/IPosRanges_comparison.c
Examining data/r-bioc-iranges-2.24.0/src/IRanges.h
Examining data/r-bioc-iranges-2.24.0/src/IRanges_class.c
Examining data/r-bioc-iranges-2.24.0/src/IRanges_constructor.c
Examining data/r-bioc-iranges-2.24.0/src/NCList.c
Examining data/r-bioc-iranges-2.24.0/src/R_init_IRanges.c
Examining data/r-bioc-iranges-2.24.0/src/Ranges_class.c
Examining data/r-bioc-iranges-2.24.0/src/RleViews_utils.c
Examining data/r-bioc-iranges-2.24.0/src/S4Vectors_stubs.c
Examining data/r-bioc-iranges-2.24.0/src/SimpleIRangesList_class.c
Examining data/r-bioc-iranges-2.24.0/src/coverage_methods.c
Examining data/r-bioc-iranges-2.24.0/src/extractListFragments.c
Examining data/r-bioc-iranges-2.24.0/src/inter_range_methods.c

FINAL RESULTS:

data/r-bioc-iranges-2.24.0/src/Grouping_class.c:137:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ans_elt, INTEGER(x_low2high_elt),
data/r-bioc-iranges-2.24.0/src/IRanges_class.c:331:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(INTEGER(ans_start), start_buf, sizeof(int) * ans_length);
data/r-bioc-iranges-2.24.0/src/IRanges_class.c:332:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(INTEGER(ans_width), width_buf, sizeof(int) * ans_length);
data/r-bioc-iranges-2.24.0/src/IRanges_class.c:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(INTEGER(ans_start), start_buf, sizeof(int) * ans_length);
data/r-bioc-iranges-2.24.0/src/IRanges_class.c:379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(INTEGER(ans_width), width_buf, sizeof(int) * ans_length);
data/r-bioc-iranges-2.24.0/src/IRanges_constructor.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char errmsg_buf[200];
data/r-bioc-iranges-2.24.0/src/NCList.c:477:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(base, x_subset_p, sizeof(int) * x_len);
data/r-bioc-iranges-2.24.0/src/NCList.c:664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[10];
data/r-bioc-iranges-2.24.0/src/NCList.c:674:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(format, "%c0%d%c", '%', max_digits, 'd');
data/r-bioc-iranges-2.24.0/src/Ranges_class.c:16:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char validity_failures[200];
data/r-bioc-iranges-2.24.0/src/coverage_methods.c:754:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char x_label_buf[40], shift_label_buf[40],

ANALYSIS SUMMARY:

Hits = 11
Lines analyzed = 6696 in approximately 0.18 seconds (37269 lines/second)
Physical Source Lines of Code (SLOC) = 4981
Hits@level = [0]  26 [1]   0 [2]  11 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]  37 [1+]  11 [2+]  11 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 7.42823 [1+] 2.20839 [2+] 2.20839 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.