41
I Use This!
High Activity
Analyzed about 9 hours ago. based on code collected about 10 hours ago.

Project Summary

The GNOME Shell handles the parts "around" the applications in GNOME. It replaces functions handled by the GNOME Panel and by the window manager in previous versions of GNOME.

Tags

clutter interface window_manager

Quick Reference

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    you can subscribe to e-mail newsletters to receive update from the Open Hub blog
  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    you can embed statistics from Open Hub on your site
About Project Security

Languages

JavaScript
47%
C
48%
6 Other
5%

30 Day Summary

Jun 8 2025 — Jul 8 2025

12 Month Summary

Jul 8 2024 — Jul 8 2025
  • 621 Commits
    Down -468 (42%) from previous 12 months
  • 127 Contributors
    Down -15 (10%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for GNOME Shell )

Repository URL: https://gitlab.gnome.org/GNOME/gnome-shell.git

Version: 49.alpha.1-10-g6caef3c40

2025-07-08
Last Analyzed
492,612
Lines of Code Analyze
0.18
Defect Density

Defects by status for current build

131
Total defects
87
Outstanding
44
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 1
676 Use of Potentially Dangerous Function 1
798 Use of Hard-coded Credentials 3