Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/wmmoonclock-1.30/src/xutils.c
Examining data/wmmoonclock-1.30/src/wmMoonClock.c
Examining data/wmmoonclock-1.30/src/CalcEphem.h
Examining data/wmmoonclock-1.30/src/xutils.h
Examining data/wmmoonclock-1.30/src/CalcEphem.c
Examining data/wmmoonclock-1.30/src/Moon.c
Examining data/wmmoonclock-1.30/src/MoonRise.h
Examining data/wmmoonclock-1.30/src/MoonRise.c
Examining data/wmmoonclock-1.30/src/Moon.h

FINAL RESULTS:

data/wmmoonclock-1.30/src/wmMoonClock.c:778:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(BackColor, argv[++i]);
data/wmmoonclock-1.30/src/wmMoonClock.c:787:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(LabelColor, argv[++i]);
data/wmmoonclock-1.30/src/wmMoonClock.c:796:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(DataColor, argv[++i]);
data/wmmoonclock-1.30/src/CalcEphem.c:238:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Sunday");
data/wmmoonclock-1.30/src/CalcEphem.c:241:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Monday");
data/wmmoonclock-1.30/src/CalcEphem.c:244:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Tuesday");
data/wmmoonclock-1.30/src/CalcEphem.c:247:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Wednesday");
data/wmmoonclock-1.30/src/CalcEphem.c:250:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Thursday");
data/wmmoonclock-1.30/src/CalcEphem.c:253:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Friday");
data/wmmoonclock-1.30/src/CalcEphem.c:256:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(dowstr, "Saturday");
data/wmmoonclock-1.30/src/CalcEphem.h:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   dowstr[80];		/* Day of week String (e.g. "Sun") */
data/wmmoonclock-1.30/src/wmMoonClock.c:139:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    LabelColor[30]    = "#a171ff";
data/wmmoonclock-1.30/src/wmMoonClock.c:140:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    DataColor[30]     = "#3dafff";
data/wmmoonclock-1.30/src/wmMoonClock.c:141:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    BackColor[30]     = "#010101";

ANALYSIS SUMMARY:

Hits = 14
Lines analyzed = 2323 in approximately 0.09 seconds (24772 lines/second)
Physical Source Lines of Code (SLOC) = 1286
Hits@level = [0]  25 [1]   0 [2]  11 [3]   0 [4]   3 [5]   0
Hits@level+ = [0+]  39 [1+]  14 [2+]  14 [3+]   3 [4+]   3 [5+]   0
Hits/KSLOC@level+ = [0+] 30.3266 [1+] 10.8865 [2+] 10.8865 [3+] 2.33281 [4+] 2.33281 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.