Coverity Scan: wazuh/wazuh

Project Name wazuh/wazuh
Lines of code analyzed 330,210
On Coverity Scan since Nov 30, 2016
Last build analyzed 6 days ago
   
Language C/C++
Repository URL https://github.com/wazuh/wazuh.git
Homepage URL https://github.com/wazuh/wazuh
License GPL (GNU General Public License version )

Want to view defects or help fix defects?

 Add me to project

Analysis Metrics

Version: v4.4.0-r40401

Dec 02, 2022
Last Analyzed
330,210
Lines of Code Analyzed
283,202
Lines of Code in Selected Components
0.25
Defect Density

Defect changes since previous build dated Dec 02, 2022

0
Newly detected
0
Eliminated

Defects by status for current build

836
Total defects
70
Outstanding
737
Fixed
See how defect density for 'wazuh/wazuh' compares with defect density for other open source projects.  Learn more

Note: Defect density is measured by the number of defects per 1,000 lines of code.


Analysis Metrics per Components

Component Name Pattern Ignore Line of Code Defect density
Active response /active-response/.* No 1,944 0.00
Agentless daemon /agentlessd/.* No 637 3.14
Analysis daemon /analysisd/.* No 23,780 0.21
Agent daemon /client-agent/.* No 2,247 1.78
External libraries /external/.* Yes 47,008 N/A
Logcollector /logcollector/.* No 6,798 0.00
Monitord /monitord/.* No 1,324 0.00
Agent auth server and client /os_auth/.* No 2,425 0.82
Syslog client daemon /os_csyslogd/.* No 831 0.00
Database output daemon /os_dbd/.* No 935 2.14
Exec daemon /os_execd/.* No 1,338 0.75
Integrator daemon /os_integrator/.* No 655 1.53
Mailing daemon /os_maild/.* No 2,120 0.00
Remote daemon /remoted/.* No 4,282 0.23
Reporting daemon /reportd/.* No 161 0.00
Rootcheck /rootcheck/.* No 3,527 0.57
File integrity monitoring /syscheckd/.* No 9,928 0.30
Wazuh Database /wazuh_db/.* No 17,262 0.64
Wazuh Modules /wazuh_modules/.* No 29,942 0.60
Windows agent /win32/.* No 0 N/A
Other .* No 173,626 0.05

CWE Top 25 defects

ID CWE-Name Number of Defects
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 3
89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 1
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 1
Loading...

Loading...

Loading...

Loading...

Loading...

About Coverity Scan Static Analysis

Find and fix defects in your C/C++, Java, JavaScript or C# open source project for free.

Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.

Would you like to view the project defects, or help improve its quality by fixing defects?

 Add me to project