![]() | Logo by Nickman (anonymous IP: 3.145.91.233,2291) | |||||||||||||
| ||||||||||||||
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Total files: 4421 Full index file Recent index file
Amigans.net Aminet IntuitionBase Hyperion Entertainment A-Eon Amiga Future
Support the site
|
![]() ![]() ![]() ![]() ![]() ![]() Flawfinder searches through C/C++ source code looking for potential security flaws. To run flawfinder, simply give flawfinder a list of directories or files. For each directory given, all files that have C/C++ filename extensions in that directory (and its subdirectories, recursively) will be examined. Thus, for most projects, simply give flawfinder the name of the source code's topmost directory, and flawfinder will examine all of the project's C/C++ source code. Flawfinder does fInotfR require that you be able to build your software, so it can be used even with incomplete source code. Inside the archive, you will find the documentation in HTML and pdf. Flawfinder is a python script but it should be able to execute it as a plain command from anywhere, as long as it is in your path, or by providing its full location. The very basic way to use it is: flawfinder src/ There is a way to generate the findings in HTML format as well. Have a look at the documentation. Please, let me know what do you think of it and if you find such tools useful. |
Copyright © 2004-2025 by Björn Hagström All Rights Reserved |