Looking for the latest version? Download flawfinder-2.0.4.tar.gz (231.1 kB)
Name Modified Size Downloads / Week Status
flawfinder 2007-01-17 33 weekly downloads
flawfinder-2.0.4.tar.gz 2017-09-03 231.1 kB 4848 weekly downloads
README 2017-09-03 2.5 kB 11 weekly downloads
flawfinder-2.0.2.tar.gz 2017-08-26 258.9 kB 0
flawfinder-2.0.0.tar.gz 2017-07-31 193.6 kB 88 weekly downloads
flawfinder-1.31.tar.gz 2014-08-03 174.1 kB 11 weekly downloads
flawfinder-1.29.tar.gz 2014-07-19 175.4 kB 0
flawfinder-1.28.tar.gz 2014-07-13 162.4 kB 0
Totals: 8 Items   1.2 MB 61
This is "flawfinder" by David A. Wheeler, <dwheeler@dwheeler.com>. Flawfinder is a simple program that scans C/C++ source code and reports potential security flaws. It can be a useful tool for examining software for vulnerabilities, and it can also serve as a simple introduction to static source code analysis tools more generally. It is designed to be easy to install and use. Flawfinder supports the Common Weakness Enumeration (CWE) and is officially CWE-Compatible. For more information, see: http://www.dwheeler.com/flawfinder Flawfinder is designed for use on Unix/Linux/POSIX systems (including Cygwin, Linux-based systems, MacOS, and *BSDs) as a command line tool. It requires Python 2.7 or Python 3. If you just want to *use* it, you can install flawfinder with Python's "pip" or with your system's package manager (flawfinder has packages for many systems). It also supports easily installation following usual "make install" source installation conventions. The file INSTALL.txt has more detailed installation instructions. You don't HAVE to install it to run it, but it's easiest that way. To run flawfinder, just give it a list of source files or directories to example. For example, to examine all files in "src/" and down recursively: flawfinder src/ The manual page (flawfinder.1 or flawfinder.pdf) describes how to use flawfinder (including its various options) and related information (such as how it supports CWE). For example, the "--html" option generates output in HTML format. The "--help" option gives a brief list of options. More technically, flawfinder uses lexical scanning to find tokens (such as function names) that suggest likely vulnerabilities, estimates their level of risk (e.g., by the text of function calls), and reports the results. Flawfinder does not use or have access to information about control flow, data flow, or data types. Thus, flawfinder will necessarily produce many false positives for vulnerabilities and fail to report many vulnerabilities. On the other hand, flawfinder can find vulnerabilities in programs that cannot be built or cannot be linked. Flawfinder also doesn't get as confused by macro definitions and other oddities that more sophisticated tools have trouble with. We love contributions! For more information on contributing, see the file CONTRIBUTING.md. Flawfinder is released under the GNU GPL license version 2 or later (GPL-2.0+). See the COPYING file for license information.
Source: README, updated 2017-09-03

Thanks for helping keep SourceForge clean.

Screenshot instructions:
Red Hat Linux   Ubuntu

Click URL instructions:
Right-click on ad, choose "Copy Link", then paste here →
(This may not be possible with some types of ads)

More information about our ad policies

Briefly describe the problem (required):

Upload screenshot of ad (required):
Select a file, or drag & drop file here.

Please provide the ad click URL, if possible:

Get latest updates about Open Source Projects, Conferences and News.

No, thanks