(venv) user@PC15050241-UB2004:~/OSS/ossKB/test_flask$ sudo valgrind --leak-check=full scanoss -M2 test2.py ==1129627== Memcheck, a memory error detector ==1129627== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==1129627== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info ==1129627== Command: scanoss -M2 test2.py ==1129627== ==1129627== Warning: set address range perms: large range [0x137000, 0x4013b000) (defined) ==1129627== Invalid read of size 1 ==1129627== at 0x40979BF4: index (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==1129627== by 0x120282: json_remove_invalid_char (util.c:189) ==1129627== by 0x119F71: print_json_component (report.c:282) ==1129627== by 0x11A37A: print_json_match (report.c:361) ==1129627== by 0x1197D1: match_list_print (match_list.c:326) ==1129627== by 0x11DA41: output_matches_json (scan.c:369) ==1129627== by 0x11DE24: ldb_scan (scan.c:492) ==1129627== by 0x11F05A: main (main.c:510) ==1129627== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==1129627== ==1129627== ==1129627== Process terminating with default action of signal 11 (SIGSEGV) ==1129627== Access not within mapped region at address 0x0 ==1129627== at 0x40979BF4: index (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==1129627== by 0x120282: json_remove_invalid_char (util.c:189) ==1129627== by 0x119F71: print_json_component (report.c:282) ==1129627== by 0x11A37A: print_json_match (report.c:361) ==1129627== by 0x1197D1: match_list_print (match_list.c:326) ==1129627== by 0x11DA41: output_matches_json (scan.c:369) ==1129627== by 0x11DE24: ldb_scan (scan.c:492) ==1129627== by 0x11F05A: main (main.c:510) ==1129627== If you believe this happened as a result of a stack ==1129627== overflow in your program's main thread (unlikely but ==1129627== possible), you can try to increase the size of the ==1129627== main thread stack using the --main-stacksize= flag. ==1129627== The main thread stack size used in this run was 8388608. {"test2.py": {"matches":[{"id": "snippet","lines": "423-813,885-930,941-1038","oss_lines": "416-806,454-499,531-628","matched": "50%","file_hash": "00bad54da05110066b08c87edf7520e8","source_hash": "8144ad21807114f1de2267fc74597413","file_url": "https://osskb.org/api/file_contents/00bad54da05110066b08c87edf7520e8","quality": [],"cryptography": [],"components":[{"purl": ["pkg:github/pallets/flask"],"vendor": "pallets","component": "flask","version": "2.1.1","latest": "2.1.1","url": "https://github.com/pallets/flask","status": "pending","release_date": "20220331","file": "src/flask/cli.py","url_hash": "a3eabb7974a4797d65237012f09a7877","licenses": [{"name": "BSD-3-Clause","source": "component_declared","url": "https://spdx.org/licenses/BSD-3-Clause.html"}]==1129627== ==1129627== HEAP SUMMARY: ==1129627== in use at exit: 10,035,515 bytes in 143 blocks ==1129627== total heap usage: 4,583 allocs, 4,440 frees, 158,655,841 bytes allocated ==1129627== ==1129627== LEAK SUMMARY: ==1129627== definitely lost: 0 bytes in 0 blocks ==1129627== indirectly lost: 0 bytes in 0 blocks ==1129627== possibly lost: 0 bytes in 0 blocks ==1129627== still reachable: 10,035,515 bytes in 143 blocks ==1129627== suppressed: 0 bytes in 0 blocks ==1129627== Reachable blocks (those to which a pointer was found) are not shown. ==1129627== To see them, rerun with: --leak-check=full --show-leak-kinds=all ==1129627== ==1129627== For lists of detected and suppressed errors, rerun with: -s ==1129627== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault