Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/r-cran-minpack.lm-1.2-1/src/minpack_lm.h Examining data/r-cran-minpack.lm-1.2-1/src/fcn_message.c Examining data/r-cran-minpack.lm-1.2-1/src/vector.c Examining data/r-cran-minpack.lm-1.2-1/src/fcn_lmdif.c Examining data/r-cran-minpack.lm-1.2-1/src/transpose.c Examining data/r-cran-minpack.lm-1.2-1/src/nls_lm.c Examining data/r-cran-minpack.lm-1.2-1/src/prod.c Examining data/r-cran-minpack.lm-1.2-1/src/get_element.c Examining data/r-cran-minpack.lm-1.2-1/src/fcn_lmder.c FINAL RESULTS: data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:6:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Relative error in the sum of squares is at most `ftol'."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:8:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Relative error between `par' and the solution is at most `ptol'."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:10:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Conditions for `info = 1' and `info = 2' both hold."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:12:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "The cosine of the angle between `fvec' and any column of the Jacobian is at most `gtol' in absolute value."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:14:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Number of calls to `fcn' has reached or exceeded `maxfev' == %d.", n); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:16:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "`ftol' is too small. No further reduction in the sum of squares is possible."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:18:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "`ptol' is too small. No further improvement in the approximate solution `par' is possible."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:20:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "`gtol' is too small. `fvec' is orthogonal to the columns of the Jacobian to machine precision."); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:22:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Number of iterations has reached `maxiter' == %d.", nit); data/r-cran-minpack.lm-1.2-1/src/fcn_message.c:24:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Improper input parameters."); data/r-cran-minpack.lm-1.2-1/src/nls_lm.c:23:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lmfun_name[8], message[256]; data/r-cran-minpack.lm-1.2-1/src/nls_lm.c:173:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(lmfun_name, "lmdif"); data/r-cran-minpack.lm-1.2-1/src/nls_lm.c:195:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(lmfun_name, "lmder"); ANALYSIS SUMMARY: Hits = 13 Lines analyzed = 569 in approximately 0.04 seconds (14396 lines/second) Physical Source Lines of Code (SLOC) = 487 Hits@level = [0] 0 [1] 0 [2] 13 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 13 [1+] 13 [2+] 13 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 26.694 [1+] 26.694 [2+] 26.694 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.