Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/r-cran-spc-0.6.4/src/xsewma_res_pms.c
Examining data/r-cran-spc-0.6.4/src/tewma_arl_wowR.c
Examining data/r-cran-spc-0.6.4/src/ewma_p_arl_be.c
Examining data/r-cran-spc-0.6.4/src/sewma_q_crit_prerun.c
Examining data/r-cran-spc-0.6.4/src/spc_init.c
Examining data/r-cran-spc-0.6.4/src/xcusum_sf.c
Examining data/r-cran-spc-0.6.4/src/xDgrsr_arl.c
Examining data/r-cran-spc-0.6.4/src/sewma_crit_prerun.c
Examining data/r-cran-spc-0.6.4/src/ccusum_arl_be.c
Examining data/r-cran-spc-0.6.4/src/ewma_phat_arl_coll.c
Examining data/r-cran-spc-0.6.4/src/mewma_ad.c
Examining data/r-cran-spc-0.6.4/src/sewma_crit.c
Examining data/r-cran-spc-0.6.4/src/xcusum_crit.c
Examining data/r-cran-spc-0.6.4/src/lns2ewma_crit.c
Examining data/r-cran-spc-0.6.4/src/sewma_res_arl.c
Examining data/r-cran-spc-0.6.4/src/sewma_arl_prerun.c
Examining data/r-cran-spc-0.6.4/src/quadrature_nodes_weights.c
Examining data/r-cran-spc-0.6.4/src/euklid_ewma_arl.c
Examining data/r-cran-spc-0.6.4/src/ccusum_crit_be.c
Examining data/r-cran-spc-0.6.4/src/xewma_ad.c
Examining data/r-cran-spc-0.6.4/src/xtewma_ad.c
Examining data/r-cran-spc-0.6.4/src/cewma_ad_be.c
Examining data/r-cran-spc-0.6.4/src/xcusum_arl.c
Examining data/r-cran-spc-0.6.4/src/sewma_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_crit.c
Examining data/r-cran-spc-0.6.4/src/sewma_sf.c
Examining data/r-cran-spc-0.6.4/src/sewma_q_crit.c
Examining data/r-cran-spc-0.6.4/src/mewma_crit.c
Examining data/r-cran-spc-0.6.4/src/xewma_q_prerun.c
Examining data/r-cran-spc-0.6.4/src/tol_lim_fac.c
Examining data/r-cran-spc-0.6.4/src/phat_cdf.c
Examining data/r-cran-spc-0.6.4/src/mewma_psi.c
Examining data/r-cran-spc-0.6.4/src/xsewma_sf.c
Examining data/r-cran-spc-0.6.4/src/xtewma_arl.c
Examining data/r-cran-spc-0.6.4/src/xgrsr_arl.c
Examining data/r-cran-spc-0.6.4/src/xgrsr_crit.c
Examining data/r-cran-spc-0.6.4/src/mewma_arl.c
Examining data/r-cran-spc-0.6.4/src/ewma_phat_lambda_coll.c
Examining data/r-cran-spc-0.6.4/src/sewma_sf_prerun.c
Examining data/r-cran-spc-0.6.4/src/xewma_arl.c
Examining data/r-cran-spc-0.6.4/src/sewma_q.c
Examining data/r-cran-spc-0.6.4/src/xcusum_q.c
Examining data/r-cran-spc-0.6.4/src/scusum_crit.c
Examining data/r-cran-spc-0.6.4/src/xsewma_q_crit.c
Examining data/r-cran-spc-0.6.4/src/mewma_arl_f.c
Examining data/r-cran-spc-0.6.4/src/allspc.c
Examining data/r-cran-spc-0.6.4/src/scusum_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_arl_f.c
Examining data/r-cran-spc-0.6.4/src/cewma_arl_be.c
Examining data/r-cran-spc-0.6.4/src/xtewma_q.c
Examining data/r-cran-spc-0.6.4/src/xDcusum_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_sf.c
Examining data/r-cran-spc-0.6.4/src/xsewma_q.c
Examining data/r-cran-spc-0.6.4/src/phat_pdf.c
Examining data/r-cran-spc-0.6.4/src/xgrsr_ad.c
Examining data/r-cran-spc-0.6.4/src/xDewma_arl.c
Examining data/r-cran-spc-0.6.4/src/xtcusum_arl.c
Examining data/r-cran-spc-0.6.4/src/cewma_crit_be.c
Examining data/r-cran-spc-0.6.4/src/xcusum_ad.c
Examining data/r-cran-spc-0.6.4/src/xsewma_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_sf_prerun.c
Examining data/r-cran-spc-0.6.4/src/sewma_q_prerun.c
Examining data/r-cran-spc-0.6.4/src/xshewhart_ar1_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_res_arl.c
Examining data/r-cran-spc-0.6.4/src/tshewhart_ar1_arl.c
Examining data/r-cran-spc-0.6.4/src/xsewma_res_arl.c
Examining data/r-cran-spc-0.6.4/src/xsewma_crit.c
Examining data/r-cran-spc-0.6.4/src/lns2ewma_arl.c
Examining data/r-cran-spc-0.6.4/src/scusum_s_arl.c
Examining data/r-cran-spc-0.6.4/src/xewma_q.c
Examining data/r-cran-spc-0.6.4/src/xtewma_sf.c
Examining data/r-cran-spc-0.6.4/src/xewma_arl_prerun.c
Examining data/r-cran-spc-0.6.4/src/ewma_phat_crit_coll.c
Examining data/r-cran-spc-0.6.4/src/phat_qf.c

FINAL RESULTS:


ANALYSIS SUMMARY:

No hits found.
Lines analyzed = 27018 in approximately 0.91 seconds (29594 lines/second)
Physical Source Lines of Code (SLOC) = 21454
Hits@level = [0]   0 [1]   0 [2]   0 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]   0 [1+]   0 [2+]   0 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+]   0 [1+]   0 [2+]   0 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.