0
I Use This!
Very Low Activity
Analyzed about 15 hours ago. based on code collected about 15 hours ago.

Project Summary

KBtin, a TinTin++ style MUD client

Tags

No tags have been added

In a Nutshell, kbtin...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    learn about Open Hub updates and features on the Open Hub blog
About Project Security

Languages

C
97%
3 Other
3%

30 Day Summary

Aug 29 2025 — Sep 28 2025

12 Month Summary

Sep 28 2024 — Sep 28 2025
  • 36 Commits
    Down -5 (12%) from previous 12 months
  • 1 Contributors
    Down 0 (0%) from previous 12 months

Ratings

Be the first to rate this project
Click to add your rating
  
Review this Project!
 

Static Analysis ( Generated by Coverity Scan for kilobyte/kbtin )

Repository URL: https://github.com/kilobyte/kbtin

Version: a94c2a4bc8e0b51ad1b0d89e1d15982e2c40e608

2023-09-04
Last Analyzed
40,380
Lines of Code Analyze
0.3
Defect Density

Defects by status for current build

45
Total defects
12
Outstanding
14
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 7
676 Use of Potentially Dangerous Function 3