Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/libtnt-1.2.6/src/tnt/tnt_array1d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_array2d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_array3d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array1d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array2d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array3d_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_stopwatch.h Examining data/libtnt-1.2.6/src/tnt/tnt_subscript.h Examining data/libtnt-1.2.6/src/tnt/tnt_version.h Examining data/libtnt-1.2.6/src/tnt/tnt.h Examining data/libtnt-1.2.6/src/tnt/tnt_array1d.h Examining data/libtnt-1.2.6/src/tnt/tnt_array2d.h Examining data/libtnt-1.2.6/src/tnt/tnt_array3d.h Examining data/libtnt-1.2.6/src/tnt/tnt_cmat.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array1d.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array2d.h Examining data/libtnt-1.2.6/src/tnt/tnt_fortran_array3d.h Examining data/libtnt-1.2.6/src/tnt/tnt_i_refvec.h Examining data/libtnt-1.2.6/src/tnt/tnt_math_utils.h Examining data/libtnt-1.2.6/src/tnt/tnt_sparse_matrix_csr.h Examining data/libtnt-1.2.6/src/tnt/tnt_vec.h FINAL RESULTS: data/libtnt-1.2.6/src/tnt/tnt_stopwatch.h:46:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline double read(); data/libtnt-1.2.6/src/tnt/tnt_stopwatch.h:80:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline double Stopwatch::read() ANALYSIS SUMMARY: Hits = 2 Lines analyzed = 4727 in approximately 0.12 seconds (40956 lines/second) Physical Source Lines of Code (SLOC) = 2999 Hits@level = [0] 0 [1] 2 [2] 0 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 2 [1+] 2 [2+] 0 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 0.666889 [1+] 0.666889 [2+] 0 [3+] 0 [4+] 0 [5+] 0 Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.