gllvm
checkedc-llvm-project
gllvm | checkedc-llvm-project | |
---|---|---|
2 | 1 | |
283 | 13 | |
2.8% | - | |
4.3 | 6.3 | |
7 days ago | 18 days ago | |
Go | ||
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gllvm
-
Turns out GCC has imperative argument handling
I think this comment puts it nicely: https://github.com/SRI-CSL/gllvm/issues/48#issuecomment-8444...
But hang on, this is Linux where file extensions are basically just decoration. So if GCC now has special behaviour (and a different linker invocation) depending if the file is a source or an object file, does that mean GCC has to do content sniffing to figure out what the command is supposed to do?
checkedc-llvm-project
-
Checked C
Note that active development seems to be continuing here:
https://github.com/secure-sw-dev/checkedc-llvm-project
What are some alternatives?
noplate - generic data structures
CodeHawk-C - CodeHawk C Analyzer: sound static analysis of memory safety (undefined behavior)
Hikari-LLVM15 - A fork of Hikari Obfuscator [WIP]
clangir - A new (MLIR based) high-level IR for clang.
CompCert - The CompCert formally-verified C compiler
codeql - CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security
archive-program - The GitHub Archive Program & Arctic Code Vault
ikos - Static analyzer for C/C++ based on the theory of Abstract Interpretation.