Project Name | opf/openproject |
---|---|
Lines of code analyzed | 2,389,682 |
On Coverity Scan since | Mar 12, 2020 |
Last build analyzed | a while ago |
Language | PHP/Python/Ruby |
Repository URL | https://github.com/opf/openproject.git |
Homepage URL | https://github.com/opf/openproject |
License | GPL (GNU General Public License version ) |
Want to view defects or help fix defects?
Add me to projectNote: Defect density is measured by the number of defects per 1,000 lines of code.
Component Name | Pattern | Ignore | Line of Code | Defect density |
---|---|---|---|---|
Frontend | /frontend/.* | No | 155,030 | 0.12 |
Public | /public/.* | Yes | 221,894 | N/A |
Vendor | .*/vendor/.* | Yes | 9,138 | N/A |
Rails application | .*/app/.*\.rb | No | 53,195 | 3.01 |
Rails lib | .*/lib/.*\.rb | No | 64,032 | 0.77 |
test bundle | /frontend/tests/openproject-test-bundle.js | Yes | 0 | N/A |
Other | .* | No | 1,886,393 | 0.04 |
ID | CWE-Name | Number of Defects |
---|---|---|
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | 1 |
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 1 |
79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 71 |
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 5 |
862 | Missing Authorization | 6 |
Coverity Scan tests every line of code and potential execution path. The root cause of each defect is clearly explained, making it easy to fix bugs.
Would you like to view the project defects, or help improve its quality by fixing defects?
Add me to project