Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/voidptr.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/objmap.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/array.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/int_convertors.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/array.h Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/descriptors.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/bool.cpp Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/threads.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/sipint.h Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/voidptr.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/objmap.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/array.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/int_convertors.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/array.h Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/descriptors.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/bool.cpp Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/threads.c Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/sipint.h Examining data/sip5-5.5.0+dfsg/code_generator/heap.c Examining data/sip5-5.5.0+dfsg/code_generator/transform.c Examining data/sip5-5.5.0+dfsg/code_generator/gencode.c Examining data/sip5-5.5.0+dfsg/code_generator/extracts.c Examining data/sip5-5.5.0+dfsg/code_generator/sip.h Examining data/sip5-5.5.0+dfsg/code_generator/export.c Examining data/sip5-5.5.0+dfsg/code_generator/pybinding.c Examining data/sip5-5.5.0+dfsg/code_generator/type_hints.c FINAL RESULTS: data/sip5-5.5.0+dfsg/code_generator/heap.c:103:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(new,sp); data/sip5-5.5.0+dfsg/code_generator/heap.c:120:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(*s,new); data/sip5-5.5.0+dfsg/code_generator/pybinding.c:448:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(&error_text[used], room, fmt, ap); data/sip5-5.5.0+dfsg/code_generator/pybinding.c:466:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(&error_text[used], room, fmt, ap); data/sip5-5.5.0+dfsg/code_generator/pybinding.c:508:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(&warning_text[used], room, fmt, ap); data/sip5-5.5.0+dfsg/code_generator/transform.c:3191:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_vname + pos + 1, cp + 2); data/sip5-5.5.0+dfsg/code_generator/transform.c:3207:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_dst + (cp - dst) + value_len, cp + name_len); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:594:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp, (cd == NULL) ? ") -> None: ...\n" : ")"); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:919:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp, ad->defval->u.vnum ? "True" : "False"); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:968:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp, anyObject(pep484)); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:1195:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp, (indent ? "\n" : "\n\n")); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c:238:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(api_copy, api); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:550:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(d,s); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:622:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&sp -> name[1],meth); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:1260:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c:238:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(api_copy, api); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:550:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(d,s); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:622:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&sp -> name[1],meth); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:1266:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/sip5-5.5.0+dfsg/code_generator/export.c:84:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(apiFile, "w")) == NULL) data/sip5-5.5.0+dfsg/code_generator/export.c:294:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(xmlFile, "w")) == NULL) data/sip5-5.5.0+dfsg/code_generator/extracts.c:58:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(fname, "w")) == NULL) data/sip5-5.5.0+dfsg/code_generator/gencode.c:953:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/sip5-5.5.0+dfsg/code_generator/gencode.c:955:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "part%d", part); data/sip5-5.5.0+dfsg/code_generator/gencode.c:3609:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/sip5-5.5.0+dfsg/code_generator/gencode.c:3611:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "_%d", iff->api_range->index); data/sip5-5.5.0+dfsg/code_generator/gencode.c:8672:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/sip5-5.5.0+dfsg/code_generator/gencode.c:8689:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "a%d", a); data/sip5-5.5.0+dfsg/code_generator/gencode.c:11129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vnamebuf[50]; data/sip5-5.5.0+dfsg/code_generator/gencode.c:11318:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vnamebuf, "a%d", only); data/sip5-5.5.0+dfsg/code_generator/gencode.c:13123:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fmt[3]; data/sip5-5.5.0+dfsg/code_generator/gencode.c:13350:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(fname, "w")) == NULL) data/sip5-5.5.0+dfsg/code_generator/pybinding.c:43:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char error_text[1000]; data/sip5-5.5.0+dfsg/code_generator/pybinding.c:501:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char warning_text[1000]; data/sip5-5.5.0+dfsg/code_generator/transform.c:3189:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_vname, vname, pos); data/sip5-5.5.0+dfsg/code_generator/transform.c:3205:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_dst, dst, cp - dst); data/sip5-5.5.0+dfsg/code_generator/transform.c:3206:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_dst + (cp - dst), vname, value_len); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:101:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(pyiFile, "w")) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:7709:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:7716:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/sip5-5.5.0+dfsg/code_generator/extracts.c:51:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ed->id) == id_len && strncmp(ed->id, id, id_len) == 0) data/sip5-5.5.0+dfsg/code_generator/heap.c:91:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(sp); data/sip5-5.5.0+dfsg/code_generator/heap.c:117:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((*s = realloc(*s,strlen(*s) + strlen(new) + 1)) == NULL) data/sip5-5.5.0+dfsg/code_generator/heap.c:117:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((*s = realloc(*s,strlen(*s) + strlen(new) + 1)) == NULL) data/sip5-5.5.0+dfsg/code_generator/pybinding.c:444:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t used = strlen(error_text); data/sip5-5.5.0+dfsg/code_generator/pybinding.c:462:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t used = strlen(error_text); data/sip5-5.5.0+dfsg/code_generator/pybinding.c:504:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t used = strlen(warning_text); data/sip5-5.5.0+dfsg/code_generator/transform.c:3180:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(names->name); data/sip5-5.5.0+dfsg/code_generator/transform.c:3181:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value_len = strlen(vname); data/sip5-5.5.0+dfsg/code_generator/transform.c:3203:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *new_dst = sipMalloc(strlen(dst) - name_len + value_len + 1); data/sip5-5.5.0+dfsg/code_generator/type_hints.c:1427:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). thd->raw_hint + strlen(thd->raw_hint), &thd->root); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c:235:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((api_copy = sip_api_malloc(strlen(api) + 1)) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:549:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((d = (char *)sip_api_malloc(strlen(s) + 1)) != NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:614:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((sp -> name = (char *)sip_api_malloc(strlen(meth) + 2)) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2234:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((args = PyTuple_New(strlen(fmt))) != NULL && buildObject(args, fmt, va) != NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2263:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((args = PyTuple_New(strlen(fmt))) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2356:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(fmt) == 1) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2583:64: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). el = PyUnicode_FromWideChar(s, (Py_ssize_t)wcslen(s)); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8124:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = PyUnicode_DecodeASCII(si->si_val, strlen(si->si_val), NULL); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8128:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = PyUnicode_DecodeLatin1(si->si_val, strlen(si->si_val), NULL); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8149:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcslen((const wchar_t *)si->si_val)); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c:235:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((api_copy = sip_api_malloc(strlen(api) + 1)) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:549:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((d = (char *)sip_api_malloc(strlen(s) + 1)) != NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:614:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((sp -> name = (char *)sip_api_malloc(strlen(meth) + 2)) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2240:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((args = PyTuple_New(strlen(fmt))) != NULL && buildObject(args, fmt, va) != NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2269:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((args = PyTuple_New(strlen(fmt))) == NULL) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2362:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(fmt) == 1) data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2589:64: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). el = PyUnicode_FromWideChar(s, (Py_ssize_t)wcslen(s)); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8131:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = PyUnicode_DecodeASCII(si->si_val, strlen(si->si_val), NULL); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8135:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = PyUnicode_DecodeLatin1(si->si_val, strlen(si->si_val), NULL); data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8156:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcslen((const wchar_t *)si->si_val)); ANALYSIS SUMMARY: Hits = 71 Lines analyzed = 59675 in approximately 1.19 seconds (50087 lines/second) Physical Source Lines of Code (SLOC) = 39515 Hits@level = [0] 214 [1] 31 [2] 21 [3] 0 [4] 19 [5] 0 Hits@level+ = [0+] 285 [1+] 71 [2+] 40 [3+] 19 [4+] 19 [5+] 0 Hits/KSLOC@level+ = [0+] 7.21245 [1+] 1.79679 [2+] 1.01227 [3+] 0.48083 [4+] 0.48083 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.