41
I Use This!
Activity Not Available
Analyzed about 2 months ago. based on code collected 2 months ago.

Project Summary

The GNOME Shell handles the parts "around" the applications in GNOME. It replaces functions handled by the GNOME Panel and by the window manager in previous versions of GNOME.

Tags

clutter interface window_manager

Quick Reference

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    you can subscribe to e-mail newsletters to receive update from the Open Hub blog
About Project Security

Languages

JavaScript
46%
C
48%
6 Other
6%

30 Day Summary

Dec 30 2024 — Jan 29 2025

12 Month Summary

Jan 29 2024 — Jan 29 2025
  • 785 Commits
    Down -298 (27%) from previous 12 months
  • 129 Contributors
    Down -8 (5%) from previous 12 months
 

Static Analysis ( Generated by Coverity Scan for GNOME Shell )

Repository URL: https://gitlab.gnome.org/GNOME/gnome-shell.git

Version: 48.alpha-67-ge9eb7e3de

2025-01-30
Last Analyzed
481,027
Lines of Code Analyze
0.18
Defect Density

Defects by status for current build

129
Total defects
86
Outstanding
43
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 1
676 Use of Potentially Dangerous Function 1
798 Use of Hard-coded Credentials 3