Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/unicorn-5.5.3/ext/unicorn_http/httpdate.c
Examining data/unicorn-5.5.3/ext/unicorn_http/global_variables.h
Examining data/unicorn-5.5.3/ext/unicorn_http/unicorn_http.c
Examining data/unicorn-5.5.3/ext/unicorn_http/c_util.h
Examining data/unicorn-5.5.3/ext/unicorn_http/ext_help.h
Examining data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h

FINAL RESULTS:

data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[64];
data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tmp, HTTP_PREFIX, HTTP_PREFIX_LEN);
data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h:95:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp + HTTP_PREFIX_LEN, cf->name, cf->len + 1);
data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(RSTRING_PTR(f), HTTP_PREFIX, HTTP_PREFIX_LEN);
data/unicorn-5.5.3/ext/unicorn_http/common_field_optimization.h:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(RSTRING_PTR(f) + HTTP_PREFIX_LEN, field, flen);
data/unicorn-5.5.3/ext/unicorn_http/unicorn_http.c:3156:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(RSTRING_PTR(hp->cont) + hp->s.dest_offset, p, nr);
data/unicorn-5.5.3/ext/unicorn_http/unicorn_http.c:4188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(RSTRING_PTR(dst), srcptr, nr);

ANALYSIS SUMMARY:

Hits = 7
Lines analyzed = 4779 in approximately 0.13 seconds (35693 lines/second)
Physical Source Lines of Code (SLOC) = 4160
Hits@level = [0]   1 [1]   0 [2]   7 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]   8 [1+]   7 [2+]   7 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 1.92308 [1+] 1.68269 [2+] 1.68269 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.