3
I Use This!
High Activity
Analyzed 1 day ago. based on code collected 1 day ago.

Project Summary

DOMjudge is an automated judge system to run programming contests like the ACM ICPC. It provides a mechanism to submit problem solutions (via command-line and the web) and (web)interfaces for teams, the jury and the general public.

Tags

contest icpc judge judging_system programming programming_contest

In a Nutshell, DOMjudge...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    check out hot projects on the Open Hub
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    anyone with an Open Hub account can update a project's tags
About Project Security

Languages

HTML
43%
PHP
29%
shell script
10%
25 Other
18%

30 Day Summary

Nov 18 2025 — Dec 18 2025

12 Month Summary

Dec 18 2024 — Dec 18 2025
  • 386 Commits
    Down -215 (35%) from previous 12 months
  • 14 Contributors
    Down -10 (41%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for DOMjudge )

Repository URL: https://github.com/DOMjudge/domjudge

Version: 10.0.0DEV/640945782

2025-12-06
Last Analyzed
199,962
Lines of Code Analyze
5.2
Defect Density

Defects by status for current build

2,004
Total defects
442
Outstanding
1,495
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 5
327 Use of a Broken or Risky Cryptographic Algorithm 1
798 Use of Hard-coded Credentials 409
829 Inclusion of Functionality from Untrusted Control Sphere 2