Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/xcb-util-0.3.8/src/xcb_aux.h Examining data/xcb-util-0.3.8/src/xcb_util.h Examining data/xcb-util-0.3.8/src/xcb_atom.h Examining data/xcb-util-0.3.8/src/xcb_bitops.h Examining data/xcb-util-0.3.8/src/xcb_event.h Examining data/xcb-util-0.3.8/src/xcb_aux.c Examining data/xcb-util-0.3.8/src/event.c Examining data/xcb-util-0.3.8/src/atoms.c FINAL RESULTS: data/xcb-util-0.3.8/src/atoms.c:644:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. n = vsnprintf(ret, size, fmt, ap); data/xcb-util-0.3.8/src/atoms.c:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str4[sizeof("FONT")]; data/xcb-util-0.3.8/src/atoms.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str6[sizeof("NOTICE")]; data/xcb-util-0.3.8/src/atoms.c:118:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str9[sizeof("FONT_NAME")]; data/xcb-util-0.3.8/src/atoms.c:119:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str10[sizeof("POINT")]; data/xcb-util-0.3.8/src/atoms.c:120:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str11[sizeof("WEIGHT")]; data/xcb-util-0.3.8/src/atoms.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str14[sizeof("MIN_SPACE")]; data/xcb-util-0.3.8/src/atoms.c:122:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str15[sizeof("CAP_HEIGHT")]; data/xcb-util-0.3.8/src/atoms.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str16[sizeof("BITMAP")]; data/xcb-util-0.3.8/src/atoms.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str17[sizeof("INTEGER")]; data/xcb-util-0.3.8/src/atoms.c:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str19[sizeof("COPYRIGHT")]; data/xcb-util-0.3.8/src/atoms.c:126:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str24[sizeof("FULL_NAME")]; data/xcb-util-0.3.8/src/atoms.c:127:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str26[sizeof("STRIKEOUT_ASCENT")]; data/xcb-util-0.3.8/src/atoms.c:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str27[sizeof("STRIKEOUT_DESCENT")]; data/xcb-util-0.3.8/src/atoms.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str28[sizeof("RGB_GREEN_MAP")]; data/xcb-util-0.3.8/src/atoms.c:130:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str29[sizeof("END_SPACE")]; data/xcb-util-0.3.8/src/atoms.c:131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str32[sizeof("RGB_BEST_MAP")]; data/xcb-util-0.3.8/src/atoms.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str33[sizeof("CARDINAL")]; data/xcb-util-0.3.8/src/atoms.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str36[sizeof("CURSOR")]; data/xcb-util-0.3.8/src/atoms.c:134:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str37[sizeof("WM_CLIENT_MACHINE")]; data/xcb-util-0.3.8/src/atoms.c:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str38[sizeof("WM_HINTS")]; data/xcb-util-0.3.8/src/atoms.c:136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str41[sizeof("CUT_BUFFER7")]; data/xcb-util-0.3.8/src/atoms.c:137:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str42[sizeof("RGB_GRAY_MAP")]; data/xcb-util-0.3.8/src/atoms.c:138:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str43[sizeof("DRAWABLE")]; data/xcb-util-0.3.8/src/atoms.c:139:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str45[sizeof("RGB_DEFAULT_MAP")]; data/xcb-util-0.3.8/src/atoms.c:140:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str46[sizeof("WINDOW")]; data/xcb-util-0.3.8/src/atoms.c:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str47[sizeof("RGB_BLUE_MAP")]; data/xcb-util-0.3.8/src/atoms.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str48[sizeof("UNDERLINE_POSITION")]; data/xcb-util-0.3.8/src/atoms.c:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str51[sizeof("RGB_RED_MAP")]; data/xcb-util-0.3.8/src/atoms.c:144:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str53[sizeof("VISUALID")]; data/xcb-util-0.3.8/src/atoms.c:145:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str54[sizeof("RECTANGLE")]; data/xcb-util-0.3.8/src/atoms.c:146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str56[sizeof("CUT_BUFFER6")]; data/xcb-util-0.3.8/src/atoms.c:147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str57[sizeof("WM_NAME")]; data/xcb-util-0.3.8/src/atoms.c:148:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str58[sizeof("X_HEIGHT")]; data/xcb-util-0.3.8/src/atoms.c:149:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str61[sizeof("SUBSCRIPT_Y")]; data/xcb-util-0.3.8/src/atoms.c:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str62[sizeof("PRIMARY")]; data/xcb-util-0.3.8/src/atoms.c:151:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str63[sizeof("COLORMAP")]; data/xcb-util-0.3.8/src/atoms.c:152:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str64[sizeof("UNDERLINE_THICKNESS")]; data/xcb-util-0.3.8/src/atoms.c:153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str65[sizeof("QUAD_WIDTH")]; data/xcb-util-0.3.8/src/atoms.c:154:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str66[sizeof("RESOURCE_MANAGER")]; data/xcb-util-0.3.8/src/atoms.c:155:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str67[sizeof("WM_ICON_NAME")]; data/xcb-util-0.3.8/src/atoms.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str68[sizeof("RGB_COLOR_MAP")]; data/xcb-util-0.3.8/src/atoms.c:157:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str70[sizeof("WM_NORMAL_HINTS")]; data/xcb-util-0.3.8/src/atoms.c:158:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str71[sizeof("CUT_BUFFER5")]; data/xcb-util-0.3.8/src/atoms.c:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str73[sizeof("WM_CLASS")]; data/xcb-util-0.3.8/src/atoms.c:160:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str75[sizeof("WM_COMMAND")]; data/xcb-util-0.3.8/src/atoms.c:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str76[sizeof("CUT_BUFFER4")]; data/xcb-util-0.3.8/src/atoms.c:162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str78[sizeof("SUPERSCRIPT_Y")]; data/xcb-util-0.3.8/src/atoms.c:163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str79[sizeof("ATOM")]; data/xcb-util-0.3.8/src/atoms.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str80[sizeof("NORM_SPACE")]; data/xcb-util-0.3.8/src/atoms.c:165:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str81[sizeof("WM_TRANSIENT_FOR")]; data/xcb-util-0.3.8/src/atoms.c:166:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str82[sizeof("WM_ICON_SIZE")]; data/xcb-util-0.3.8/src/atoms.c:167:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str83[sizeof("WM_ZOOM_HINTS")]; data/xcb-util-0.3.8/src/atoms.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str84[sizeof("MAX_SPACE")]; data/xcb-util-0.3.8/src/atoms.c:169:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str85[sizeof("POINT_SIZE")]; data/xcb-util-0.3.8/src/atoms.c:170:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str86[sizeof("PIXMAP")]; data/xcb-util-0.3.8/src/atoms.c:171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str90[sizeof("RESOLUTION")]; data/xcb-util-0.3.8/src/atoms.c:172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str91[sizeof("SUBSCRIPT_X")]; data/xcb-util-0.3.8/src/atoms.c:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str92[sizeof("ITALIC_ANGLE")]; data/xcb-util-0.3.8/src/atoms.c:174:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str93[sizeof("ARC")]; data/xcb-util-0.3.8/src/atoms.c:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str96[sizeof("CUT_BUFFER3")]; data/xcb-util-0.3.8/src/atoms.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str98[sizeof("WM_SIZE_HINTS")]; data/xcb-util-0.3.8/src/atoms.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str101[sizeof("CUT_BUFFER2")]; data/xcb-util-0.3.8/src/atoms.c:178:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str106[sizeof("CUT_BUFFER1")]; data/xcb-util-0.3.8/src/atoms.c:179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str108[sizeof("SUPERSCRIPT_X")]; data/xcb-util-0.3.8/src/atoms.c:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str111[sizeof("CUT_BUFFER0")]; data/xcb-util-0.3.8/src/atoms.c:181:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str116[sizeof("STRING")]; data/xcb-util-0.3.8/src/atoms.c:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str121[sizeof("FAMILY_NAME")]; data/xcb-util-0.3.8/src/atoms.c:183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringpool_str149[sizeof("SECONDARY")]; data/xcb-util-0.3.8/src/xcb_aux.c:314:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen (color_name); ANALYSIS SUMMARY: Hits = 70 Lines analyzed = 1866 in approximately 0.06 seconds (30112 lines/second) Physical Source Lines of Code (SLOC) = 1442 Hits@level = [0] 0 [1] 1 [2] 68 [3] 0 [4] 1 [5] 0 Hits@level+ = [0+] 70 [1+] 70 [2+] 69 [3+] 1 [4+] 1 [5+] 0 Hits/KSLOC@level+ = [0+] 48.5437 [1+] 48.5437 [2+] 47.8502 [3+] 0.693481 [4+] 0.693481 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.