head	1.2;
access;
symbols
	RELEASE_8_3_0:1.2
	RELEASE_9_0_0:1.2
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.2
	RELEASE_6_4_0:1.2
	RELEASE_5_EOL:1.2
	RELEASE_7_0_0:1.2
	RELEASE_6_3_0:1.2
	PRE_XORG_7:1.2
	RELEASE_4_EOL:1.2
	RELEASE_6_2_0:1.2
	RELEASE_6_1_0:1.2
	RELEASE_5_5_0:1.2
	RELEASE_6_0_0:1.2
	RELEASE_5_4_0:1.2
	RELEASE_4_11_0:1.2
	RELEASE_5_3_0:1.2
	RELEASE_4_10_0:1.2
	RELEASE_5_2_1:1.2
	RELEASE_5_2_0:1.2
	RELEASE_4_9_0:1.2
	RELEASE_5_1_0:1.2
	RELEASE_4_8_0:1.2
	RELEASE_5_0_0:1.2
	RELEASE_4_7_0:1.2
	RELEASE_4_6_2:1.2
	RELEASE_4_6_1:1.2
	RELEASE_4_6_0:1.2
	RELEASE_5_0_DP1:1.2
	RELEASE_4_5_0:1.2
	RELEASE_4_4_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2002.01.05.09.32.58;	author olgeni;	state Exp;
branches;
next	1.1;

1.1
date	2001.08.23.12.54.48;	author kris;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Remove extra hyphen and spaces.
@
text
@Flawfinder searches through source code looking for potential security
flaws. Flawfinder uses an internal database called the ``ruleset''; the
ruleset identifies functions that are common causes of security flaws.
Every potential security flaw found in a given source code file (matching
an entry in the ruleset) is called a ``hit,'' and the set of hits found
during any particular run is called the ``hitlist.''

WWW: http://www.dwheeler.com/flawfinder/
@


1.1
log
@Move flawfinder from devel to security where the other source-code auditing
tools live.

Discussed with: ijliao
@
text
@d1 2
a2 2
Flawfinder searches through source code looking for poten- tial security
flaws. Flawfinder uses an internal database called  the  ``ruleset''; the
d4 1
a4 1
Every potential security  flaw found in a given source code file (matching
@

