Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/amb-plugins-0.8.1/ambisonic0.cc Examining data/amb-plugins-0.8.1/ambisonic0.h Examining data/amb-plugins-0.8.1/allpass.cc Examining data/amb-plugins-0.8.1/ambisonic1.cc Examining data/amb-plugins-0.8.1/ambisonic1.h Examining data/amb-plugins-0.8.1/ambisonic2.cc Examining data/amb-plugins-0.8.1/ambisonic2.h Examining data/amb-plugins-0.8.1/ambisonic3.cc Examining data/amb-plugins-0.8.1/ambisonic3.h Examining data/amb-plugins-0.8.1/filter1.cc Examining data/amb-plugins-0.8.1/filter1.h Examining data/amb-plugins-0.8.1/ladspa.h Examining data/amb-plugins-0.8.1/ladspaplugin.h Examining data/amb-plugins-0.8.1/virtmic.cc Examining data/amb-plugins-0.8.1/virtmic.h Examining data/amb-plugins-0.8.1/allpass.h Examining data/amb-plugins-0.8.1/ambisonic0_if.cc Examining data/amb-plugins-0.8.1/ambisonic1_if.cc Examining data/amb-plugins-0.8.1/ambisonic2_if.cc Examining data/amb-plugins-0.8.1/ambisonic3_if.cc FINAL RESULTS: data/amb-plugins-0.8.1/ambisonic0_if.cc:98:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname0 [Ladspa_Tricard2amb::NPORT] = data/amb-plugins-0.8.1/ambisonic0_if.cc:148:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname1 [Ladspa_Virtualmic::NPORT] = data/amb-plugins-0.8.1/ambisonic0_if.cc:200:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname2 [Ladspa_UHJ_encoder::NPORT] = data/amb-plugins-0.8.1/ambisonic0_if.cc:244:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname3 [Ladspa_UHJ_decoder::NPORT] = data/amb-plugins-0.8.1/ambisonic1.cc:186:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic1.cc:187:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic1_if.cc:98:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname0 [Ladspa_Monopan11::NPORT] = data/amb-plugins-0.8.1/ambisonic1_if.cc:147:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname1 [Ladspa_Stereopan11::NPORT] = data/amb-plugins-0.8.1/ambisonic1_if.cc:200:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname2 [Ladspa_Rotator11::NPORT] = data/amb-plugins-0.8.1/ambisonic1_if.cc:258:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname3 [Ladspa_SquareDec11::NPORT] = data/amb-plugins-0.8.1/ambisonic1_if.cc:328:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname4 [Ladspa_HexaDec11::NPORT] = data/amb-plugins-0.8.1/ambisonic1_if.cc:403:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname5 [Ladspa_CubeDec11::NPORT] = data/amb-plugins-0.8.1/ambisonic2.cc:132:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic2.cc:133:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic2.cc:299:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic2.cc:300:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic2.cc:301:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_R], _port [INP_R], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic2_if.cc:100:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname0 [Ladspa_Monopan21::NPORT] = data/amb-plugins-0.8.1/ambisonic2_if.cc:157:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname1 [Ladspa_Rotator21::NPORT] = data/amb-plugins-0.8.1/ambisonic2_if.cc:221:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname2 [Ladspa_Monopan22::NPORT] = data/amb-plugins-0.8.1/ambisonic2_if.cc:290:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname3 [Ladspa_Rotator22::NPORT] = data/amb-plugins-0.8.1/ambisonic3.cc:154:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_W], _port [INP_W], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic3.cc:155:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (float)); data/amb-plugins-0.8.1/ambisonic3.cc:395:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_W], _port [INP_W], len * sizeof (LADSPA_Data)); data/amb-plugins-0.8.1/ambisonic3.cc:396:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_Z], _port [INP_Z], len * sizeof (LADSPA_Data)); data/amb-plugins-0.8.1/ambisonic3.cc:397:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_R], _port [INP_R], len * sizeof (LADSPA_Data)); data/amb-plugins-0.8.1/ambisonic3.cc:398:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (_port [OUT_K], _port [INP_K], len * sizeof (LADSPA_Data)); data/amb-plugins-0.8.1/ambisonic3_if.cc:104:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname0 [Ladspa_Monopan31::NPORT] = data/amb-plugins-0.8.1/ambisonic3_if.cc:166:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname1 [Ladspa_Rotator31::NPORT] = data/amb-plugins-0.8.1/ambisonic3_if.cc:238:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname2 [Ladspa_Monopan33::NPORT] = data/amb-plugins-0.8.1/ambisonic3_if.cc:323:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const pname3 [Ladspa_Rotator33::NPORT] = ANALYSIS SUMMARY: Hits = 31 Lines analyzed = 5372 in approximately 0.12 seconds (43260 lines/second) Physical Source Lines of Code (SLOC) = 3628 Hits@level = [0] 0 [1] 0 [2] 31 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 31 [1+] 31 [2+] 31 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 8.54465 [1+] 8.54465 [2+] 8.54465 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.