Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/octave-communications-1.2.2/src/op-m-gm.cc
Examining data/octave-communications-1.2.2/src/galoisfield.h
Examining data/octave-communications-1.2.2/src/galoisfield.cc
Examining data/octave-communications-1.2.2/src/syndtable.cc
Examining data/octave-communications-1.2.2/src/gf.cc
Examining data/octave-communications-1.2.2/src/ov-galois.cc
Examining data/octave-communications-1.2.2/src/primpoly.cc
Examining data/octave-communications-1.2.2/src/undef-ah-octave.h
Examining data/octave-communications-1.2.2/src/base-lu.h
Examining data/octave-communications-1.2.2/src/galois.cc
Examining data/octave-communications-1.2.2/src/op-gm-gm.cc
Examining data/octave-communications-1.2.2/src/galois-def.cc
Examining data/octave-communications-1.2.2/src/__gfweight__.cc
Examining data/octave-communications-1.2.2/src/cyclpoly.cc
Examining data/octave-communications-1.2.2/src/__errcore__.cc
Examining data/octave-communications-1.2.2/src/isprimitive.cc
Examining data/octave-communications-1.2.2/src/cyclgen.cc
Examining data/octave-communications-1.2.2/src/galois.h
Examining data/octave-communications-1.2.2/src/galois-ops.h
Examining data/octave-communications-1.2.2/src/genqamdemod.cc
Examining data/octave-communications-1.2.2/src/base-lu.cc
Examining data/octave-communications-1.2.2/src/op-s-gm.cc
Examining data/octave-communications-1.2.2/src/op-gm-s.cc
Examining data/octave-communications-1.2.2/src/op-gm-m.cc
Examining data/octave-communications-1.2.2/src/ov-galois.h
Examining data/octave-communications-1.2.2/src/galois-def.h

FINAL RESULTS:

data/octave-communications-1.2.2/src/cyclgen.cc:223:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (!system)
data/octave-communications-1.2.2/src/gf.cc:1745:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(lambda, t, (nroots+1)*sizeof (t[0]));
data/octave-communications-1.2.2/src/gf.cc:1759:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&reg[1], &lambda[1], nroots*sizeof (reg[0]));
data/octave-communications-1.2.2/src/ov-galois.cc:563:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (! is.read (X_CAST (char *, &mord), 1))
data/octave-communications-1.2.2/src/ov-galois.cc:566:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (! is.read (X_CAST (char *, &prim), 4))
data/octave-communications-1.2.2/src/ov-galois.cc:571:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (! is.read (X_CAST (char *, &mdims), 4))
data/octave-communications-1.2.2/src/ov-galois.cc:586:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (! is.read (X_CAST (char *, &di), 4))
data/octave-communications-1.2.2/src/ov-galois.cc:594:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (! is.read (X_CAST (char *, &tmp), 1))

ANALYSIS SUMMARY:

Hits = 8
Lines analyzed = 9165 in approximately 0.23 seconds (39817 lines/second)
Physical Source Lines of Code (SLOC) = 6471
Hits@level = [0]   0 [1]   5 [2]   2 [3]   0 [4]   1 [5]   0
Hits@level+ = [0+]   8 [1+]   8 [2+]   3 [3+]   1 [4+]   1 [5+]   0
Hits/KSLOC@level+ = [0+] 1.23628 [1+] 1.23628 [2+] 0.463607 [3+] 0.154536 [4+] 0.154536 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.