Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/r-cran-gsl-2.1-6/src/hyperg.c
Examining data/r-cran-gsl-2.1-6/src/qrng.c
Examining data/r-cran-gsl-2.1-6/src/gamma.c
Examining data/r-cran-gsl-2.1-6/src/poly.c
Examining data/r-cran-gsl-2.1-6/src/pow_int.c
Examining data/r-cran-gsl-2.1-6/src/bessel.c
Examining data/r-cran-gsl-2.1-6/src/coupling.c
Examining data/r-cran-gsl-2.1-6/src/debye.c
Examining data/r-cran-gsl-2.1-6/src/dawson.c
Examining data/r-cran-gsl-2.1-6/src/lambert.c
Examining data/r-cran-gsl-2.1-6/src/transport.c
Examining data/r-cran-gsl-2.1-6/src/rng.c
Examining data/r-cran-gsl-2.1-6/src/vector.c
Examining data/r-cran-gsl-2.1-6/src/laguerre.c
Examining data/r-cran-gsl-2.1-6/src/synchrotron.c
Examining data/r-cran-gsl-2.1-6/src/vector.h
Examining data/r-cran-gsl-2.1-6/src/error.c
Examining data/r-cran-gsl-2.1-6/src/clausen.c
Examining data/r-cran-gsl-2.1-6/src/elljac.c
Examining data/r-cran-gsl-2.1-6/src/ellint.c
Examining data/r-cran-gsl-2.1-6/src/psi.c
Examining data/r-cran-gsl-2.1-6/src/gegenbauer.c
Examining data/r-cran-gsl-2.1-6/src/fermi_dirac.c
Examining data/r-cran-gsl-2.1-6/src/coulomb.c
Examining data/r-cran-gsl-2.1-6/src/init.c
Examining data/r-cran-gsl-2.1-6/src/legendre.c
Examining data/r-cran-gsl-2.1-6/src/airy.c
Examining data/r-cran-gsl-2.1-6/src/expint.c
Examining data/r-cran-gsl-2.1-6/src/log.c
Examining data/r-cran-gsl-2.1-6/src/trig.c
Examining data/r-cran-gsl-2.1-6/src/zeta.c
Examining data/r-cran-gsl-2.1-6/src/dilog.c

FINAL RESULTS:


ANALYSIS SUMMARY:

No hits found.
Lines analyzed = 4211 in approximately 0.12 seconds (34872 lines/second)
Physical Source Lines of Code (SLOC) = 3435
Hits@level = [0]   0 [1]   0 [2]   0 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]   0 [1+]   0 [2+]   0 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+]   0 [1+]   0 [2+]   0 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.