41
I Use This!
High Activity
Analyzed about 9 hours ago. based on code collected about 9 hours ago.

Project Summary

The GNOME Shell handles the parts "around" the applications in GNOME. It replaces functions handled by the GNOME Panel and by the window manager in previous versions of GNOME.

Tags

clutter interface window_manager

Quick Reference

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    data presented on the Open Hub is available through our API
About Project Security

Languages

JavaScript
47%
C
48%
6 Other
5%

30 Day Summary

Nov 12 2025 — Dec 12 2025

12 Month Summary

Dec 12 2024 — Dec 12 2025
  • 747 Commits
    Down -182 (19%) from previous 12 months
  • 131 Contributors
    Up + 3 (2%) from previous 12 months
 

Static Analysis ( Generated by Coverity Scan for GNOME Shell )

Repository URL: https://gitlab.gnome.org/GNOME/gnome-shell.git

Version: 49.alpha.1-33-g92429be21

2025-07-26
Last Analyzed
492,617
Lines of Code Analyze
0.18
Defect Density

Defects by status for current build

131
Total defects
87
Outstanding
44
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 1
676 Use of Potentially Dangerous Function 1
798 Use of Hard-coded Credentials 3