Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/jblas-1.2.4/config/arch_flavor.c Examining data/jblas-1.2.4/src/main/c/org_jblas_NativeBlas.h Examining data/jblas-1.2.4/src/main/c/NativeBlas.c Examining data/jblas-1.2.4/src/main/c/org_jblas_util_ArchFlavor.h Examining data/jblas-1.2.4/src/main/c/jblas_arch_flavor.c Examining data/jblas-1.2.4/scripts/java-impl.c Examining data/jblas-1.2.4/scripts/c-header.h Examining data/jblas-1.2.4/scripts/c-file.c FINAL RESULTS: data/jblas-1.2.4/scripts/java-impl.c:184:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "XERBLA: Error on argument %d for *unknown function* %s (how odd!)\n", *info, name); data/jblas-1.2.4/scripts/java-impl.c:187:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "XERBLA: Error on argument %d (%s) in %s", *info, arguments[*info-1], name); data/jblas-1.2.4/src/main/c/NativeBlas.c:236:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "XERBLA: Error on argument %d for *unknown function* %s (how odd!)\n", *info, name); data/jblas-1.2.4/src/main/c/NativeBlas.c:239:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "XERBLA: Error on argument %d (%s) in %s", *info, arguments[*info-1], name); data/jblas-1.2.4/scripts/java-impl.c:164:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[7]; data/jblas-1.2.4/scripts/java-impl.c:165:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[256]; data/jblas-1.2.4/src/main/c/NativeBlas.c:216:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[7]; data/jblas-1.2.4/src/main/c/NativeBlas.c:217:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[256]; ANALYSIS SUMMARY: Hits = 8 Lines analyzed = 6417 in approximately 0.21 seconds (30330 lines/second) Physical Source Lines of Code (SLOC) = 5226 Hits@level = [0] 3 [1] 0 [2] 4 [3] 0 [4] 4 [5] 0 Hits@level+ = [0+] 11 [1+] 8 [2+] 8 [3+] 4 [4+] 4 [5+] 0 Hits/KSLOC@level+ = [0+] 2.10486 [1+] 1.53081 [2+] 1.53081 [3+] 0.765404 [4+] 0.765404 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.