Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c

FINAL RESULTS:

data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:261:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(iatom->elname, elname);
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:337:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(opts, options);
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:539:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szInchi, inchiString);
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:547:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(szOptions, optionsString);
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:256:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(elname) > ATOM_EL_LEN) {
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:336:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    opts = malloc(sizeof(char) * (strlen(options)+1));
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:538:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    szInchi = malloc(sizeof(char) * (strlen(inchiString)+1));
data/jni-inchi-0.8+dfsg/src/main/native/jni-inchi/JniInchiWrapper.c:546:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    szOptions = malloc(sizeof(char) * (strlen(optionsString)+1));

ANALYSIS SUMMARY:

Hits = 8
Lines analyzed = 831 in approximately 0.72 seconds (1152 lines/second)
Physical Source Lines of Code (SLOC) = 499
Hits@level = [0]  20 [1]   4 [2]   0 [3]   0 [4]   4 [5]   0
Hits@level+ = [0+]  28 [1+]   8 [2+]   4 [3+]   4 [4+]   4 [5+]   0
Hits/KSLOC@level+ = [0+] 56.1122 [1+] 16.0321 [2+] 8.01603 [3+] 8.01603 [4+] 8.01603 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.