Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/opensta-0~20191111gitc018cb2+dfsg/app/Main.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArcDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArnoldiDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArnoldiReduce.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DcalcAnalysisPt.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DmpCeff.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DmpDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc1.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/LumpedCapDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/NetCaps.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/RCDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/SimpleRCDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/UnitDelayCalc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/Delay.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayFloat.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayNormal1.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayNormal2.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/Graph.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/GraphCmp.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/EquivCells.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/InternalPower.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LeakagePower.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Liberty.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyBuilder.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExt.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LinearModel.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Sequential.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TableModel.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TimingArc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TimingRole.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Transition.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Units.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Wireload.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteNetwork.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/HpinDrvrLoad.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/NetworkCmp.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/PortDirection.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/ConcreteParasitics.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/EstimateParasitics.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/NullParasitics.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/Parasitics.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/ReduceParasitics.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/Clock.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockGatingCheck.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockGroups.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockInsertion.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockLatency.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/CycleAccting.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DataCheck.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DeratingFactors.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DisabledPorts.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PinPair.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PortDelay.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PortExtCap.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallMinMax.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallValues.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/Sdc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/SdcCmdComment.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/ReportAnnotation.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Bfs.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMaxSkews.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMinPeriods.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMinPulseWidths.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckSlewLimits.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckTiming.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ClkSkew.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Corner.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Crpr.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/FindRegister.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/GatedClk.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Genclks.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Levelize.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathAnalysisPt.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnd.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnumed.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathExpanded.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathGroup.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathRef.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Power.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Property.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/SearchPred.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Sim.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Sta.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/StaState.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Tag.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/TagGroup.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VertexVisitor.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VisitPathEnds.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VisitPathGroupVertices.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WorstSlack.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Condition.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/DispatchQueue.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Error.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Fuzzy.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Hash.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/MinMax.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Mutex.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/PatternMatch.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Pthread.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReadWriteLock.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReportStd.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReportTcl.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Stats.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringSeq.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringSet.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Thread.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadException.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadPool.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadWorker.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/util/TokenParser.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc Examining data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogWriter.cc FINAL RESULTS: data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:207:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr, left); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:166:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(token_, prev_token); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:163:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:274:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:277:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, port_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:362:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:365:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, net_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1492:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tail, d + 1); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1525:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(last, d + 1); data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:427:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1285:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1394:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1748:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:735:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sdf_name, "%s%c%s", inst_path, sdf_divider_, port_name); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:759:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path_ptr, inst_name); data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:142:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/search/Tag.cc:173:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str.c_str()); data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc:59:34: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ...) __attribute__((format (printf, 2, 3))); data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:60:34: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ...) __attribute__((format (printf, 2, 3))); data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:64:34: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ...) __attribute__((format (printf, 2, 3))); data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc:97:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(what_cpy, what); data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:34:16: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int length = vsnprintf(str, size, fmt, args); data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:41:14: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. length = vsnprintf(buffer, size, fmt, args_copy2); data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:43:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copy, str); data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:115:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, tmp); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:103:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi(thread_arg); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:242:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char code[4] = {s[0], s[1], s[2], '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:243:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). char ch = atoi(code); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:329:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *histin = fopen(".history_sta", "r"); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:350:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *histout = fopen(".history_sta", "w"); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc:61:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LibertyLex_in = fopen(filename, "r"); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc:515:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *stream = fopen(filename, "r" ); data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:365:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char bus_brkts_left[2]{bus_brkt_left, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:366:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char bus_brkts_right[2]{bus_brkt_right, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:56:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char brkts_left[2] = {brkt_left, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:57:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char brkts_right[2] = {brkt_right, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:88:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index = atoi(left + 1); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:104:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char brkts_left[2] = {brkt_left, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:105:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char brkts_right[2] = {brkt_right, '\0'}; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:142:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). from = atoi(left + 1); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:143:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). to = atoi(range + 1); data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:302:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int i = atoi(index + 1); data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:312:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int index = atoi(name + 1); data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:540:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int id = atoi(id_str); data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:343:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream_ = fopen(filename, "w"); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:83:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sdf_check, data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:162:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(delay_format_, "%%.%df", digits); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:595:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *sdf_check, data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:304:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). case LatchEnableState::open: { data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:465:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). state = LatchEnableState::open; data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:477:30: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). state = LatchEnableState::open; data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:491:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). state = LatchEnableState::open; data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc:284:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_arrivals, arrivals, arrival_count * sizeof(Arrival)); data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:97:64: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). || sta_->latches()->latchDtoQState(edge) == LatchEnableState::open); data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:190:64: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). || sta_->latches()->latchDtoQState(edge) == LatchEnableState::open) data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:2659:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_tag_groups, tag_groups_, data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:2888:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_tags, tags_, tag_capacity_ * sizeof(Tag*)); data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc:316:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). spice_stream_.open(spice_filename_); data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:216:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). spice_stream_.open(spice_filename_); data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:155:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *status = fopen(proc_filename.c_str(), "r"); data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[line_length]; data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:238:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). log_stream_ = fopen(filename, "w"); data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:254:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). redirect_stream_ = fopen(filename, "w"); data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:262:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). redirect_stream_ = fopen(filename, "a"); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:546:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char **net_names = new const char *[port_count]; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1432:17: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size_t size = atol(tmp); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1474:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value_digit_str[2]; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogWriter.cc:70:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *stream = fopen(filename, "w"); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:234:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(init); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:240:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t init_length = strlen(init); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:315:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:333:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t read; data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:335:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[strlen(line)-1] = 0; data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc1.cc:1657:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!ClockSet::equal(clks, clks1)) { data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:202:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t left_length = strlen(left); data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:231:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(left) + 1 + strlen(right) + 1; data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:231:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(left) + 1 + strlen(right) + 1; data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:130:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(func_); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:140:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, func_, count); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc:696:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned unit_str_length = strlen(unit_str); data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc:829:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(bus_style) == 6 data/opensta-0~20191111gitc018cb2+dfsg/liberty/Units.cc:82:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return digits_ + (suffix_ ? strlen(suffix_) : 0) + 2; data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:272:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bool bus_pattern = (pattern1[strlen(pattern1) - 1] == bus_brkt_right); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:154:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length += strlen(name(inst)) + 1; data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:164:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_ptr += strlen(inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:268:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t inst_name_length = strlen(inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:270:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t port_name_length = strlen(port_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:356:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t inst_name_length = strlen(inst_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:358:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t net_name_length = strlen(net_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:617:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). context_name_length = strlen(pathName(context)) + 1; data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1487:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(first, path_name, d - path_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1490:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tail = new char[strlen(d)]; data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1520:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(head, path_name, d - path_name); data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1523:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). last = new char[strlen(d)]; data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:34:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:71:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:85:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bus_name, name, bus_name_len); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:120:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:138:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bus_name, name, bus_name_len); data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:556:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *sdc_name = makeTmpString(strlen(sta_name) + 1); data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:591:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && bus_name[strlen(bus_name) - 1] == ']') { data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:620:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && bus_name[strlen(bus_name) - 1] == ']') { data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:812:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && bus_name[strlen(bus_name) - 1] == ']') { data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:68:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(new_str, str, length); data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:84:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t verilog_name_length = strlen(sta_name) + 3; data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:130:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sta_name_length = strlen(verilog_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc:28:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *trans_token = new char[strlen(token) + 1]; data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc:69:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *trans_token = new char[strlen(token) + 1]; data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:207:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = static_cast<int>(strlen(buf)); data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:219:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strlen(buf); data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:220:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(type) + strlen(from_thru_to) + 1; data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:220:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(type) + strlen(from_thru_to) + 1; data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:333:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. || from_->equal(from2)))) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:348:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. || thru->equal(thru)))) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:362:11: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. || to_->equal(to2)))) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1072:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. ExceptionFromTo::equal(ExceptionFromTo *from_to) const data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1074:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return PinSet::equal(from_to->pins_, pins_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1075:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && ClockSet::equal(from_to->clks_, clks_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1076:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && InstanceSet::equal(from_to->insts_, insts_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1964:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. ExceptionThru::equal(ExceptionThru *thru) const data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1967:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return PinSet::equal(thru->pins_, pins_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1968:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && NetSet::equal(thru->nets_, nets_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1969:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && InstanceSet::equal(thru->insts_, insts_) data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:153:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. return drive1->equal(drive2) data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:154:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive1->equal(drive3) data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:155:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive1->equal(drive4); data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:214:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. InputDriveCell::equal(InputDriveCell *drive) const data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallMinMax.cc:207:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. RiseFallMinMax::equal(const RiseFallMinMax *values) const data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:319:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). instance_name_length_(strlen(sdc_network_->pathName(instance))), data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:370:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). time_str[strlen(time_str) - 1] = '\0'; data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:640:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (early_values->equal(late_values)) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:685:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (src_rise->equal(src_fall) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1697:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive_rise_min->equal(drive_rise_max) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1698:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive_rise_min->equal(drive_fall_min) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1699:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive_rise_min->equal(drive_fall_max)) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1705:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive_rise_min->equal(drive_rise_max)) data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1717:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && drive_fall_min->equal(drive_fall_max)) data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:97:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return reader.read(); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:120:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return reader.read(); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:164:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). SdfReader::read() data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:861:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = &cond_port[strlen(cond_port) - 1]; data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:951:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *unescaped = makeTmpString(strlen(token) + 1); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:1005:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strlen(buf); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:1017:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strlen(buf); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:203:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). time_str[strlen(time_str) - 1] = '\0'; data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:734:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *sdf_name = makeTmpString(strlen(inst_path)+1+strlen(port_name)+1); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:734:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *sdf_name = makeTmpString(strlen(inst_path)+1+strlen(port_name)+1); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:750:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_length += strlen(sdfName(inst)) + 1; data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:760:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_ptr += strlen(inst_name); data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:774:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *sdf_name = makeTmpString(strlen(name) * 2 + 1); data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:215:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. || (PathVertexRep::equal(clk_info1->crprClkPath(), data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:220:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && MinMaxValues<float>::equal(uncertainties1, data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc:246:7: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Path::equal(const Path *path1, data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc:347:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. && equal(&p1, path1, sta)) data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:217:11: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Path::equal(&p, after_div, this) ? " <-diversion" : ""); data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:552:15: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (Path::equal(&p, after_div, this)) data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:558:15: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (Path::equal(&p, before_div, this)) { data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc:301:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. PathVertex::equal(const PathVertex *path1, data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc:162:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. PathVertexRep::equal(const PathVertexRep *path1, data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc:170:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. PathVertexRep::equal(const PathVertexRep &path1, data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1633:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reportDashLine(strlen("transition_time") + field_slew_->width() + 1, data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1792:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int line_len = strlen(key) + 2 + strlen(pt) + 2 + reason.size() + 1; data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1792:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int line_len = strlen(key) + 2 + strlen(pt) + 2 + reason.size() + 1; data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1800:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (unsigned i = 0; i < strlen(key); i++) data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:3102:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(what); data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:3217:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i = strlen(value); i < field->width(); i++) data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:659:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return stringPrintTmp(strlen(net_name_) + 10, "%s/%d", data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc:96:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *what_cpy = new char[strlen(what) + 1]; data/opensta-0~20191111gitc018cb2+dfsg/util/Hash.cc:27:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(str); data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:42:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *copy = new char[strlen(str) + 1]; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:61:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return verilog_reader->read(filename); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:153:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). constant10_max_length_ = strlen(constant10_max_); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:177:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). VerilogReader::read(const char *filename) data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:239:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strlen(buf); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:251:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = strlen(buf); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:492:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). net_bus_names_ += strlen(name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:508:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). net_scalar_names_ += strlen(name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:518:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). net_bus_names_ += strlen(name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:578:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inst_names_ += strlen(inst_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:587:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inst_module_names_ += strlen(module_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:588:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inst_names_ += strlen(inst_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:628:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). net_scalar_names_ += strlen(net_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:629:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). port_names_ += strlen(port_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:642:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). net_scalar_names_ += strlen(net_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:643:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). port_names_ += strlen(port_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:655:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). port_names_ += strlen(port_name) + 1; data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1421:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t constant_length = strlen(constant); data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1510:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(tmp); ANALYSIS SUMMARY: Hits = 188 Lines analyzed = 91589 in approximately 1.62 seconds (56611 lines/second) Physical Source Lines of Code (SLOC) = 78166 Hits@level = [0] 304 [1] 120 [2] 43 [3] 0 [4] 25 [5] 0 Hits@level+ = [0+] 492 [1+] 188 [2+] 68 [3+] 25 [4+] 25 [5+] 0 Hits/KSLOC@level+ = [0+] 6.2943 [1+] 2.40514 [2+] 0.869943 [3+] 0.319832 [4+] 0.319832 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.