Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow-wayland.c Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow-wayland.h Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow-x11.c Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow-x11.h Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow.c Examining data/gnome-sushi-3.34.0/src/libsushi/externalwindow.h Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-font-loader.c Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-font-loader.h Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-font-widget.c Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-font-widget.h Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-media-bin.c Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-media-bin.h Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-utils.c Examining data/gnome-sushi-3.34.0/src/libsushi/sushi-utils.h FINAL RESULTS: data/gnome-sushi-3.34.0/src/libsushi/sushi-font-widget.c:297:12: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rand = g_random_int_range (0, total_chars); data/gnome-sushi-3.34.0/src/libsushi/externalwindow.c:56:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *x11_handle_str = handle_str + strlen (x11_prefix); data/gnome-sushi-3.34.0/src/libsushi/externalwindow.c:69:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *wayland_handle_str = handle_str + strlen (wayland_prefix); data/gnome-sushi-3.34.0/src/libsushi/sushi-font-widget.c:116:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text, 0, strlen (text), ANALYSIS SUMMARY: Hits = 4 Lines analyzed = 4611 in approximately 0.14 seconds (32440 lines/second) Physical Source Lines of Code (SLOC) = 3147 Hits@level = [0] 0 [1] 3 [2] 0 [3] 1 [4] 0 [5] 0 Hits@level+ = [0+] 4 [1+] 4 [2+] 1 [3+] 1 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 1.27105 [1+] 1.27105 [2+] 0.317763 [3+] 0.317763 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.