Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/ros-collada-urdf-1.12.13/collada_parser/include/collada_parser/collada_parser.h Examining data/ros-collada-urdf-1.12.13/collada_parser/include/collada_parser/collada_parser_plugin.h Examining data/ros-collada-urdf-1.12.13/collada_parser/src/collada_parser.cpp Examining data/ros-collada-urdf-1.12.13/collada_parser/src/collada_parser_plugin.cpp Examining data/ros-collada-urdf-1.12.13/collada_urdf/include/collada_urdf/collada_urdf.h Examining data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp Examining data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_urdf.cpp Examining data/ros-collada-urdf-1.12.13/collada_urdf/src/urdf_to_collada.cpp Examining data/ros-collada-urdf-1.12.13/collada_urdf/test/test_collada_urdf.cpp FINAL RESULTS: data/ros-collada-urdf-1.12.13/collada_parser/src/collada_parser.cpp:433:39: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _dom = (domCOLLADA*)_collada->open(filename); data/ros-collada-urdf-1.12.13/collada_parser/src/collada_parser.cpp:1359:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(geometry->filename.c_str(),O_WRONLY|O_CREAT|O_EXCL); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:216:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tmp_os.open(ofname.c_str()); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:218:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). is.open(ifname.c_str()); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:289:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tmp_os.open(ofname.c_str()); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:291:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). is.open(ifname.c_str()); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:518:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). os.open(file.c_str()); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_urdf.cpp:126:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, pos_, to_read); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_urdf.cpp:443:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fevecs, fmat, sizeof(double)*9); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:75:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname.erase(0, strlen("file://")); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:115:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname.erase(0, strlen("file://")); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:206:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ifname.erase(0, strlen("file://")); data/ros-collada-urdf-1.12.13/collada_urdf/src/collada_to_urdf.cpp:269:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ifname.erase(0, strlen("file://")); ANALYSIS SUMMARY: Hits = 13 Lines analyzed = 5794 in approximately 0.20 seconds (28524 lines/second) Physical Source Lines of Code (SLOC) = 4591 Hits@level = [0] 0 [1] 4 [2] 9 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 13 [1+] 13 [2+] 9 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 2.83163 [1+] 2.83163 [2+] 1.96036 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.