Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/gtk-sharp3-2.99.3/gio/glue/win32dll.c
Examining data/gtk-sharp3-2.99.3/sample/opaquetest/opaques.h
Examining data/gtk-sharp3-2.99.3/sample/opaquetest/opaques.c
Examining data/gtk-sharp3-2.99.3/sample/valtest/valobj.h
Examining data/gtk-sharp3-2.99.3/sample/valtest/valobj.c
Examining data/gtk-sharp3-2.99.3/gtk/glue/widget.c
Examining data/gtk-sharp3-2.99.3/gtk/glue/style.c
Examining data/gtk-sharp3-2.99.3/gtk/glue/cellrenderer.c
Examining data/gtk-sharp3-2.99.3/gtk/glue/container.c
Examining data/gtk-sharp3-2.99.3/gtk/glue/vmglueheaders.h
Examining data/gtk-sharp3-2.99.3/gtk/glue/win32dll.c
Examining data/gtk-sharp3-2.99.3/gtk/gui-thread-check/profiler/gui-thread-check.c
Examining data/gtk-sharp3-2.99.3/atk/glue/misc.c
Examining data/gtk-sharp3-2.99.3/atk/glue/util.c
Examining data/gtk-sharp3-2.99.3/atk/glue/vmglueheaders.h
Examining data/gtk-sharp3-2.99.3/atk/glue/win32dll.c
Examining data/gtk-sharp3-2.99.3/pango/glue/win32dll.c

FINAL RESULTS:

data/gtk-sharp3-2.99.3/sample/opaquetest/opaques.c:201:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf (stderr, msg, ap);

ANALYSIS SUMMARY:

Hits = 1
Lines analyzed = 1353 in approximately 0.29 seconds (4607 lines/second)
Physical Source Lines of Code (SLOC) = 927
Hits@level = [0]   4 [1]   0 [2]   0 [3]   0 [4]   1 [5]   0
Hits@level+ = [0+]   5 [1+]   1 [2+]   1 [3+]   1 [4+]   1 [5+]   0
Hits/KSLOC@level+ = [0+] 5.39374 [1+] 1.07875 [2+] 1.07875 [3+] 1.07875 [4+] 1.07875 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.