Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/r-cran-spc-0.6.4/src/xsewma_res_pms.c Examining data/r-cran-spc-0.6.4/src/tewma_arl_wowR.c Examining data/r-cran-spc-0.6.4/src/ewma_p_arl_be.c Examining data/r-cran-spc-0.6.4/src/sewma_q_crit_prerun.c Examining data/r-cran-spc-0.6.4/src/spc_init.c Examining data/r-cran-spc-0.6.4/src/xcusum_sf.c Examining data/r-cran-spc-0.6.4/src/xDgrsr_arl.c Examining data/r-cran-spc-0.6.4/src/sewma_crit_prerun.c Examining data/r-cran-spc-0.6.4/src/ccusum_arl_be.c Examining data/r-cran-spc-0.6.4/src/ewma_phat_arl_coll.c Examining data/r-cran-spc-0.6.4/src/mewma_ad.c Examining data/r-cran-spc-0.6.4/src/sewma_crit.c Examining data/r-cran-spc-0.6.4/src/xcusum_crit.c Examining data/r-cran-spc-0.6.4/src/lns2ewma_crit.c Examining data/r-cran-spc-0.6.4/src/sewma_res_arl.c Examining data/r-cran-spc-0.6.4/src/sewma_arl_prerun.c Examining data/r-cran-spc-0.6.4/src/quadrature_nodes_weights.c Examining data/r-cran-spc-0.6.4/src/euklid_ewma_arl.c Examining data/r-cran-spc-0.6.4/src/ccusum_crit_be.c Examining data/r-cran-spc-0.6.4/src/xewma_ad.c Examining data/r-cran-spc-0.6.4/src/xtewma_ad.c Examining data/r-cran-spc-0.6.4/src/cewma_ad_be.c Examining data/r-cran-spc-0.6.4/src/xcusum_arl.c Examining data/r-cran-spc-0.6.4/src/sewma_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_crit.c Examining data/r-cran-spc-0.6.4/src/sewma_sf.c Examining data/r-cran-spc-0.6.4/src/sewma_q_crit.c Examining data/r-cran-spc-0.6.4/src/mewma_crit.c Examining data/r-cran-spc-0.6.4/src/xewma_q_prerun.c Examining data/r-cran-spc-0.6.4/src/tol_lim_fac.c Examining data/r-cran-spc-0.6.4/src/phat_cdf.c Examining data/r-cran-spc-0.6.4/src/mewma_psi.c Examining data/r-cran-spc-0.6.4/src/xsewma_sf.c Examining data/r-cran-spc-0.6.4/src/xtewma_arl.c Examining data/r-cran-spc-0.6.4/src/xgrsr_arl.c Examining data/r-cran-spc-0.6.4/src/xgrsr_crit.c Examining data/r-cran-spc-0.6.4/src/mewma_arl.c Examining data/r-cran-spc-0.6.4/src/ewma_phat_lambda_coll.c Examining data/r-cran-spc-0.6.4/src/sewma_sf_prerun.c Examining data/r-cran-spc-0.6.4/src/xewma_arl.c Examining data/r-cran-spc-0.6.4/src/sewma_q.c Examining data/r-cran-spc-0.6.4/src/xcusum_q.c Examining data/r-cran-spc-0.6.4/src/scusum_crit.c Examining data/r-cran-spc-0.6.4/src/xsewma_q_crit.c Examining data/r-cran-spc-0.6.4/src/mewma_arl_f.c Examining data/r-cran-spc-0.6.4/src/allspc.c Examining data/r-cran-spc-0.6.4/src/scusum_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_arl_f.c Examining data/r-cran-spc-0.6.4/src/cewma_arl_be.c Examining data/r-cran-spc-0.6.4/src/xtewma_q.c Examining data/r-cran-spc-0.6.4/src/xDcusum_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_sf.c Examining data/r-cran-spc-0.6.4/src/xsewma_q.c Examining data/r-cran-spc-0.6.4/src/phat_pdf.c Examining data/r-cran-spc-0.6.4/src/xgrsr_ad.c Examining data/r-cran-spc-0.6.4/src/xDewma_arl.c Examining data/r-cran-spc-0.6.4/src/xtcusum_arl.c Examining data/r-cran-spc-0.6.4/src/cewma_crit_be.c Examining data/r-cran-spc-0.6.4/src/xcusum_ad.c Examining data/r-cran-spc-0.6.4/src/xsewma_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_sf_prerun.c Examining data/r-cran-spc-0.6.4/src/sewma_q_prerun.c Examining data/r-cran-spc-0.6.4/src/xshewhart_ar1_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_res_arl.c Examining data/r-cran-spc-0.6.4/src/tshewhart_ar1_arl.c Examining data/r-cran-spc-0.6.4/src/xsewma_res_arl.c Examining data/r-cran-spc-0.6.4/src/xsewma_crit.c Examining data/r-cran-spc-0.6.4/src/lns2ewma_arl.c Examining data/r-cran-spc-0.6.4/src/scusum_s_arl.c Examining data/r-cran-spc-0.6.4/src/xewma_q.c Examining data/r-cran-spc-0.6.4/src/xtewma_sf.c Examining data/r-cran-spc-0.6.4/src/xewma_arl_prerun.c Examining data/r-cran-spc-0.6.4/src/ewma_phat_crit_coll.c Examining data/r-cran-spc-0.6.4/src/phat_qf.c FINAL RESULTS: ANALYSIS SUMMARY: No hits found. Lines analyzed = 27018 in approximately 0.91 seconds (29594 lines/second) Physical Source Lines of Code (SLOC) = 21454 Hits@level = [0] 0 [1] 0 [2] 0 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 0 [1+] 0 [2+] 0 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 0 [1+] 0 [2+] 0 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.