0
I Use This!
Very Low Activity
Analyzed 4 days ago. based on code collected 4 days ago.

Project Summary

KBtin, a TinTin++ style MUD client

Tags

No tags have been added

In a Nutshell, kbtin...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    there are over 3,000 projects on the Open Hub with security vulnerabilities reported against them
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    check out hot projects on the Open Hub
About Project Security

Languages

C
97%
3 Other
3%

30 Day Summary

Apr 30 2024 — May 30 2024

12 Month Summary

May 30 2023 — May 30 2024
  • 80 Commits
    Down -9 (10%) from previous 12 months
  • 1 Contributors
    Down 0 (0%) from previous 12 months

Ratings

Be the first to rate this project
Click to add your rating
  
Review this Project!
 

Static Analysis ( Generated by Coverity Scan for kilobyte/kbtin )

Repository URL: https://github.com/kilobyte/kbtin

Version: a94c2a4bc8e0b51ad1b0d89e1d15982e2c40e608

2023-09-04
Last Analyzed
40,380
Lines of Code Analyze
0.3
Defect Density

Defects by status for current build

45
Total defects
12
Outstanding
14
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 7
676 Use of Potentially Dangerous Function 3