{"id":37151583,"url":"https://github.com/daelde/cmake_check","last_synced_at":"2026-01-14T17:54:18.726Z","repository":{"id":57201082,"uuid":"136742750","full_name":"DaelDe/cmake_check","owner":"DaelDe","description":"Static analysis for CMake files.","archived":true,"fork":false,"pushed_at":"2020-03-16T22:41:32.000Z","size":195,"stargazers_count":20,"open_issues_count":12,"forks_count":4,"subscribers_count":3,"default_branch":"master","last_synced_at":"2024-05-06T10:35:37.005Z","etag":null,"topics":["checker","cmake","coding-standards","continuous-integration","linter"],"latest_commit_sha":null,"homepage":"","language":"TypeScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DaelDe.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2018-06-09T17:05:38.000Z","updated_at":"2024-04-02T17:40:52.000Z","dependencies_parsed_at":"2022-09-15T11:23:00.012Z","dependency_job_id":null,"html_url":"https://github.com/DaelDe/cmake_check","commit_stats":null,"previous_names":[],"tags_count":4,"template":false,"template_full_name":null,"purl":"pkg:github/DaelDe/cmake_check","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DaelDe%2Fcmake_check","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DaelDe%2Fcmake_check/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DaelDe%2Fcmake_check/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DaelDe%2Fcmake_check/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DaelDe","download_url":"https://codeload.github.com/DaelDe/cmake_check/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DaelDe%2Fcmake_check/sbom","scorecard":{"id":35970,"data":{"date":"2025-08-11","repo":{"name":"github.com/DaelDe/cmake_check","commit":"156895b059ffebdf97fbabab79a5eba5b8490149"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":2,"checks":[{"name":"Code-Review","score":2,"reason":"Found 2/8 approved changesets -- score normalized to 2","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Maintained","score":0,"reason":"project is archived","details":["Warn: Repository is archived."],"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Pinned-Dependencies","score":-1,"reason":"no dependencies found","details":null,"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.2.0 not signed: https://api.github.com/repos/DaelDe/cmake_check/releases/12943865","Warn: release artifact v0.1.4 not signed: https://api.github.com/repos/DaelDe/cmake_check/releases/12478052","Warn: release artifact v0.1.3 not signed: https://api.github.com/repos/DaelDe/cmake_check/releases/12472299","Warn: release artifact v0.1.0 not signed: https://api.github.com/repos/DaelDe/cmake_check/releases/11609037","Warn: release artifact v0.2.0 does not have provenance: https://api.github.com/repos/DaelDe/cmake_check/releases/12943865","Warn: release artifact v0.1.4 does not have provenance: https://api.github.com/repos/DaelDe/cmake_check/releases/12478052","Warn: release artifact v0.1.3 does not have provenance: https://api.github.com/repos/DaelDe/cmake_check/releases/12472299","Warn: release artifact v0.1.0 does not have provenance: https://api.github.com/repos/DaelDe/cmake_check/releases/11609037"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 27 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":0,"reason":"17 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-v88g-cgmw-v5xw","Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw","Warn: Project is vulnerable to: GHSA-fwr7-v2mv-hh25","Warn: Project is vulnerable to: GHSA-v6h2-p8h4-qcjw","Warn: Project is vulnerable to: GHSA-257v-vj4p-3w2h","Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275","Warn: Project is vulnerable to: GHSA-4q6p-r6v2-jvc5","Warn: Project is vulnerable to: GHSA-p6mc-m468-83gw","Warn: Project is vulnerable to: GHSA-29mw-wpgm-hmr9","Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm","Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3","Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m","Warn: Project is vulnerable to: GHSA-xvch-5gv4-984h","Warn: Project is vulnerable to: GHSA-g6ww-v8xp-vmwg","Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw","Warn: Project is vulnerable to: GHSA-c4w7-xm78-47vh","Warn: Project is vulnerable to: GHSA-p9pc-299p-vxgp"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-14T20:18:53.603Z","repository_id":57201082,"created_at":"2025-08-14T20:18:53.604Z","updated_at":"2025-08-14T20:18:53.604Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28428984,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-14T16:38:47.836Z","status":"ssl_error","status_checked_at":"2026-01-14T16:34:59.695Z","response_time":107,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["checker","cmake","coding-standards","continuous-integration","linter"],"created_at":"2026-01-14T17:54:16.493Z","updated_at":"2026-01-14T17:54:18.719Z","avatar_url":"https://github.com/DaelDe.png","language":"TypeScript","readme":"\u003ca name=\"___top\"\u003e\u003c/a\u003e\n[![NPM](https://nodei.co/npm/cmake_check.png)](https://nodei.co/npm/cmake_check/)\n\n[![Build status](https://travis-ci.org/DaelDe/cmake_check.svg?branch=master)](https://travis-ci.org/DaelDe/cmake_check)\n[![Known Vulnerabilities](https://snyk.io/test/github/DaelDe/cmake_check/badge.svg?targetFile=package.json)](https://snyk.io/test/github/DaelDe/cmake_check?targetFile=package.json)\n\n# cmake_check\nCmake_check is a linter for the [CMake language](https://cmake.org). It takes a set of user-defined \nrules and reports violations for CMakeLists.txt files and CMake modules.\n\n*   [Quick Start](#Quick_Start)\n*   [Overview](#Overview)\n*   [Download](https://github.com/DaelDe/cmake_check/releases/latest)\n    *   [Binaries](#binaries)\n    *   [Npm](#npm)\n*   [Versioning](#Versioning)\n*   [Basic Usage](#basic_usage)\n    *   [Configuration](#config)\n*   [How it Works](#How_it_works)\n*   [Limitations](#Limitations)\n*   [Features Currently in Development](#in_progress)\n\n\u003ca name=\"Quick_Start\"\u003e\u003c/a\u003e  \n# [Quick Start \u0026#9650;](#___top \"click to go to top of document\")\n\nStep 1:  Download cmake_check (several methods, see below).\n\nStep 2:  Open a terminal (`cmd.exe` on Windows).\n\nStep 3:  Invoke cmake_check to check your CMake files or directories.\nThe executable name differs depending on whether you use the\ndevelopment source version (`cmake_check`), a Windows executable\n(`cmake_check.exe`) or , a Linux executable\n(`cmake_check`).  On this page, `cmake_check` is the generic term\nused to refer to any of these.\n\n**a file**\n\u003cpre\u003e\nprompt\u003e cmake_check -i CMakeLists.txt -v\ninfo: Checking CMakeLists.txt\nCMakeLists(10).txt (66) : warning Whitelist: calls to some_custom_function are not allowed by whitelist\ninfo: Checked 1 files\ninfo: 0 files are clean\ninfo: 1 files have 2 warnings\ninfo: 0 files are ignored\ninfo: took {\"durationMs\":28}\n\u003c/pre\u003e\n\n**a directory**\n\u003cpre\u003e\nprompt\u003e cmake_check -i project_folder -v\ninfo: Checking files in project_folder\nproject_folder/libFoo/CMakeLists.txt (66) : warning Whitelist: calls to some_custom_function are not allowed by whitelist\nproject_folder/libBar/CMakeLists.txt (50) : warning Whitelist: calls to some_other_custom_function are not allowed by whitelist\n...\ninfo: Checked 769 files\ninfo: 186 files are clean\ninfo: 583 files have 1566 warnings\ninfo: 0 files are ignored\ninfo: took {\"durationMs\":2270}\n\u003c/pre\u003e\n\n\u003ca name=\"Overview\"\u003e\u003c/a\u003e\n# [Overview \u0026#9650;](#___top \"click to go to top of document\")\n\nCmake_check is a linter for the [CMake language](https://cmake.org). It takes a set of user-defined \nrules and reports violations for CMakeLists.txt files and CMake modules.\nCMake_check is a command line application suitable for continuous integration checks. This is \nespecially useful for large source trees with hundreds of CMake files.\nCmake_check can be used to enforce a certain coding style or project/company guidelines. It is\nwritten in TypeScript and runs on every platform where node.js is available.\n\nFeatures are:\n- recursive check of all CMake files in a given directory\n- allows combination of checks to form custom rules\n- a rule may consist of any number of [checks](doc/Checks.md)\n- provides warning output (msbuild format) that can be used by the \n  [jenkins warnings plugin](https://wiki.jenkins.io/display/JENKINS/Warnings+Plugin)\n\nAvailable checks:\n- require commands to exist (or not exist)\n- allow white-listed commands only (to limit the use of custom functions)\n\nPlanned checks:\n- require a specific command order\n- constraints on specific command arguments\n- constraints on paths (e.g. no ..)\n- comment checks\n- maximum line length\n- indentation checks\n\n\u003ca name=\"binaries\"\u003e\u003c/a\u003e\n## [Binaries \u0026#9650;](#___top \"click to go to top of document\")\nEach [release](https://github.com/DaelDe/cmake_check/releases) comes with a set \nof Linux and Windows binaries.\n\n\u003ca name=\"npm\"\u003e\u003c/a\u003e\n## [NPM \u0026#9650;](#___top \"click to go to top of document\")\nInstall [NodeJS](https://nodejs.org/) (version \u003e 8.11).\n```sh\nnpm install -g cmake_check\n```\n\n\u003ca name=\"Versioning\"\u003e\u003c/a\u003e\n# [Versioning \u0026#9650;](#___top \"click to go to top of document\")\nCmake_check uses [semantic versioning](https://semver.org/).\n\n\u003ca name=\"basic_usage\"\u003e\u003c/a\u003e\n# [Basic Usage \u0026#9650;](#___top \"click to go to top of document\")\nThe basic use is:\n```sh\ncmake_check -i \u003cinput folder or file\u003e\n```\nor with custom configuration:\n```sh\ncmake_check -c \u003cconfig file\u003e -i \u003cinput folder or file\u003e\n```\n\nAll CMake files in the given input folders are analyzed with the given configuration.\nAll warnings are written to stdout.\n\nFor more information and further available options call `cmake_check -h`.\n\n\u003ca name=\"config\"\u003e\u003c/a\u003e\n## [Configuration \u0026#9650;](#___top \"click to go to top of document\")\nThe documentation for the cmake_check configuration is available on \na [separate page](doc/Configuration.adoc).\n\n\u003ca name=\"How_it_works\"\u003e\u003c/a\u003e\n# [How It Works \u0026#9650;](#___top \"click to go to top of document\")\n\nCmake_check uses a [parser-generator](https://github.com/pegjs/pegjs)\nand a [grammar](https://github.com/DaelDe/cmake_check/blob/readme/res/cmake.pegjs) \nto create a parser of the [CMake language](https://cmake.org/cmake/help/latest/manual/cmake-language.7.html).\nAll CMakeLists.txt files from input are parsed to a structured object. \nAll configured checks are executed on that object. Failed checks are \nprinted as warnings.\n\n\u003ca name=\"Limitations\"\u003e\u003c/a\u003e\n# [Limitations](#___top \"click to go to top of document\")\n- the language parser will fail on CMakeLists.txt files that do not conform to the CMake language\n  - these errors are reported by CMake itself, a successful run of CMake on the input files is a precondition for cmake_check\n\n\u003ca name=\"in_progress\"\u003e\u003c/a\u003e\n# [Features under development \u0026#9650;](#___top \"click to go to top of document\")\nSee the [development board](https://github.com/DaelDe/cmake_check/projects/2) for issues that are in work.\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdaelde%2Fcmake_check","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdaelde%2Fcmake_check","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdaelde%2Fcmake_check/lists"}