This repository provides categorized examples of common C programming bugs detected using the Splint static analysis tool. While most compilers can catch syntax errors, Splint goes deeper to uncover hidden memory issues, logic flaws, and security vulnerabilities.
- How Splint detects null pointer dereferences
- How it identifies uninitialized memory usage
- Detection of memory leaks and dangling references
- Prevention of buffer overflows
- Checks for unsafe macros and naming convention violations
- Detection of dangerous aliasing and control flow problems