646
I Use This!
Moderate Activity
Analyzed about 8 hours ago. based on code collected about 8 hours ago.

Project Summary

Zsh is a UNIX command interpreter (shell) which of the standard shells most resembles the Korn shell (ksh). It includes enhancements of many types, notably in the command-line editor, options for customising its behaviour, filename globbing, features to make C-shell (csh) users feel more at home and extra features drawn from tcsh.

Tags

command-line commandlineinterpreter posix shell shells shellscripting sysadmin system system_shells unix

BSD 3-clause "New" or "Revised" License
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Hold Liable

Use Trademarks

Required

Include Copyright

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    data presented on the Open Hub is available through our API
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    check out hot projects on the Open Hub
About Project Security

Languages

C
90%
9 Other
10%

30 Day Summary

Apr 17 2025 — May 17 2025

12 Month Summary

May 17 2024 — May 17 2025
  • 127 Commits
    Down -110 (46%) from previous 12 months
  • 26 Contributors
    Down -9 (25%) from previous 12 months
 

Static Analysis ( Generated by Coverity Scan for zsh )

Repository URL: https://git.code.sf.net/p/zsh/code

Version: zsh-5.9-539-ge19cfe7cac

2025-04-14
Last Analyzed
138,122
Lines of Code Analyze
0.53
Defect Density

Defects by status for current build

311
Total defects
73
Outstanding
148
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 7
190 Integer Overflow or Wraparound 10