0
I Use This!
Activity Not Available
Analyzed 3 months ago. based on code collected 3 months ago.

Project Summary

This tool reads your C/C++ source finding the beginning of each routineand places code that can call a function or similar via a pattern fileExample: int X::b() {}To: int X::b() { /* %TRACE% */ FUNC_TRACE("X::b()"); /* %TRACE% */ }

Tags

No tags have been added

In a Nutshell, traceString...

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    compare projects before you chose one to use
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    data presented on the Open Hub is available through our API
About Project Security

Languages

Languages?height=75&width=75
C++
62%
Autoconf
22%
shell script
9%
5 Other
7%

30 Day Summary

Feb 2 2020 — Mar 3 2020

12 Month Summary

Mar 3 2019 — Mar 3 2020

Ratings

Be the first to rate this project
Click to add your rating
   Spinner
Review this Project!