Coverity Scan: wazuh/wazuh

Project Name wazuh/wazuh
Lines of code analyzed 398,459
On Coverity Scan since Nov 30, 2016
Last build analyzed 3 days ago
   
Language C/C++
Repository URL https://github.com/wazuh/wazuh.git
Homepage URL https://github.com/wazuh/wazuh
License GPL (GNU General Public License version )

Want to view defects or help fix defects?

 Add me to project

Analysis Metrics

Version: v4.10.0-r41004

Nov 20, 2024
Last Analyzed
398,459
Lines of Code Analyzed
198,318
Lines of Code in Selected Components
1.21
Defect Density

Defect changes since previous build dated Nov 12, 2024

0
Newly detected
0
Eliminated

Defects by status for current build

1,358
Total defects
240
Outstanding
1,000
Fixed
See how defect density for 'wazuh/wazuh' compares with defect density for other open source projects.  Learn more

Note: Defect density is measured by the number of defects per 1,000 lines of code.


Analysis Metrics per Components

Component Name Pattern Ignore Line of Code Defect density
Active response /active-response/.* No 2,122 0.00
Agentless daemon /agentlessd/.* No 637 4.71
Analysis daemon /analysisd/.* No 23,905 0.54
Agent daemon /client-agent/.* No 2,434 2.05
External libraries /external/.* Yes 80,853 N/A
Logcollector /logcollector/.* No 7,850 0.64
Monitord /monitord/.* No 1,329 0.75
Agent auth server and client /os_auth/.* No 2,727 0.37
Syslog client daemon /os_csyslogd/.* No 847 2.36
Database output daemon /os_dbd/.* No 935 2.14
Exec daemon /os_execd/.* No 1,394 1.43
Integrator daemon /os_integrator/.* No 698 2.87
Mailing daemon /os_maild/.* No 2,126 0.47
Remote daemon /remoted/.* No 4,554 1.10
Reporting daemon /reportd/.* No 161 0.00
Rootcheck /rootcheck/.* No 3,529 0.85
File integrity monitoring /syscheckd/.* No 13,093 2.67
Wazuh Database /wazuh_db/.* No 17,031 0.70
Wazuh Modules /wazuh_modules/.* No 33,325 0.90
Windows agent /win32/.* No 0 N/A
C++ Standard Library /usr/include/.* Yes 119,288 N/A
Other .* No 79,631 0.70

CWE Top 25 defects

ID CWE-Name Number of Defects
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 3
89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 1
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 1
190 Integer Overflow or Wraparound 26
Loading...

Loading...

Loading...

Loading...

Loading...

About Coverity Scan Static Analysis

Find and fix defects in your C/C++, Java, JavaScript or C# open source project for free.

Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.

Would you like to view the project defects, or help improve its quality by fixing defects?

 Add me to project