{"id":33234318,"url":"https://svf-tools.github.io/SVF/","last_synced_at":"2025-11-21T12:02:14.231Z","repository":{"id":33261496,"uuid":"36905975","full_name":"SVF-tools/SVF","owner":"SVF-tools","description":"Static Value-Flow Analysis Framework for Source Code","archived":false,"fork":false,"pushed_at":"2025-10-31T03:28:55.000Z","size":20361,"stargazers_count":1614,"open_issues_count":353,"forks_count":467,"subscribers_count":54,"default_branch":"master","last_synced_at":"2025-10-31T05:34:48.173Z","etag":null,"topics":["code-analysis","code-security","dependency-analysis","llvm","pointer-analysis","points-to-analysis","source-code-analysis","static-analysis","static-analyzer","static-value-flow"],"latest_commit_sha":null,"homepage":"http://svf-tools.github.io/SVF/","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/SVF-tools.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.TXT","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2015-06-05T01:52:24.000Z","updated_at":"2025-10-31T03:28:59.000Z","dependencies_parsed_at":"2023-12-28T06:38:45.527Z","dependency_job_id":"cde8296c-007a-4ee7-b69d-f80d05abcfc5","html_url":"https://github.com/SVF-tools/SVF","commit_stats":{"total_commits":3061,"total_committers":132,"mean_commits":"23.189393939393938","dds":0.67624959163672,"last_synced_commit":"6390f9b9d6db92c806247cc94192d2e977b1317a"},"previous_names":[],"tags_count":23,"template":false,"template_full_name":null,"purl":"pkg:github/SVF-tools/SVF","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SVF-tools%2FSVF","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SVF-tools%2FSVF/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SVF-tools%2FSVF/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SVF-tools%2FSVF/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/SVF-tools","download_url":"https://codeload.github.com/SVF-tools/SVF/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SVF-tools%2FSVF/sbom","scorecard":{"id":124603,"data":{"date":"2025-08-11","repo":{"name":"github.com/SVF-tools/SVF","commit":"5c9d6b5af2cac6449f560429ad6ca562c059761f"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.7,"checks":[{"name":"Code-Review","score":5,"reason":"Found 9/18 approved changesets -- score normalized to 5","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Maintained","score":10,"reason":"30 commit(s) and 8 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/docker_publish.yml:1","Warn: no topLevel permission defined: .github/workflows/github-action.yml:1","Warn: no topLevel permission defined: .github/workflows/svf-lib_publish.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Vulnerabilities","score":10,"reason":"0 existing vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":9,"reason":"license file detected","details":["Info: project has a license file: LICENSE.TXT:0","Warn: project license file does not contain an FSF or OSI license."],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker_publish.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/docker_publish.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker_publish.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/docker_publish.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker_publish.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/docker_publish.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker_publish.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/docker_publish.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker_publish.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/docker_publish.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/github-action.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/github-action.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/github-action.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/github-action.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/github-action.yml:150: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/github-action.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/svf-lib_publish.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/svf-lib_publish.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/svf-lib_publish.yml:30: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/svf-lib_publish.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/svf-lib_publish.yml:143: update your workflow using https://app.stepsecurity.io/secureworkflow/SVF-tools/SVF/svf-lib_publish.yml/master?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating ubuntu:24.04 to ubuntu:24.04@sha256:a08e551cb33850e4740772b38217fc1796a66da2506d312abe51acda354ff061","Info:   0 out of   4 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   7 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact SVF-3.1 not signed: https://api.github.com/repos/SVF-tools/SVF/releases/223347066","Warn: release artifact SVF-3.0 not signed: https://api.github.com/repos/SVF-tools/SVF/releases/157708131","Warn: release artifact SVF-3.1 does not have provenance: https://api.github.com/repos/SVF-tools/SVF/releases/223347066","Warn: release artifact SVF-3.0 does not have provenance: https://api.github.com/repos/SVF-tools/SVF/releases/157708131"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/docker_publish.yml:8"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 21 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}}]},"last_synced_at":"2025-08-16T03:27:09.084Z","repository_id":33261496,"created_at":"2025-08-16T03:27:09.084Z","updated_at":"2025-08-16T03:27:09.084Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":285611836,"owners_count":27201484,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-11-21T02:00:06.175Z","response_time":61,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["code-analysis","code-security","dependency-analysis","llvm","pointer-analysis","points-to-analysis","source-code-analysis","static-analysis","static-analyzer","static-value-flow"],"created_at":"2025-11-16T18:00:29.929Z","updated_at":"2025-11-21T12:02:14.210Z","avatar_url":"https://github.com/SVF-tools.png","language":"C++","readme":"\u003cimg src=\"./docs/images/svf_logo_2.png\" width=\"15%\"\u003e\u003cimg src=\"./docs/images/svf_logo_3.png\" width=\"85%\"\u003e\n\n\n## News\n* \u003cb\u003eSVF now supports new [build system](https://github.com/SVF-tools/SVF/pull/1703) (Thank [Johannes](https://github.com/Johanmyst) for his help!). \u003c/b\u003e\n* \u003cb\u003e [SVF-Python](https://github.com/SVF-tools/SVF-Python) is now available, enabling developers to write static analyzers in Python by leveraging the SVF library (Contributed by [Jiawei Wang](https://github.com/bjjwwang)). \u003c/b\u003e\n* \u003cb\u003eNew course [Software Security Analysis](https://github.com/SVF-tools/Software-Security-Analysis) for learning code analysis and verification with SVF for fun and expertise! \u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-16.0.0 with opaque pointers (Contributed by [Xiao Cheng](https://github.com/jumormt)). \u003c/b\u003e\n* \u003cb\u003eModernize SVF's CMake (Contributed by [Johannes](https://github.com/Johanmyst)). \u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-13.0.0 (Thank [Shengjie Xu](https://github.com/xushengj) for his help!). \u003c/b\u003e\n* \u003cb\u003e[Object clustering](https://github.com/SVF-tools/SVF/wiki/Object-Clustering) published in our [OOPSLA paper](https://yuleisui.github.io/publications/oopsla21.pdf) is now available in SVF \u003c/b\u003e\n* \u003cb\u003e[Hash-Consed Points-To Sets](https://github.com/SVF-tools/SVF/wiki/Hash-Consed-Points-To-Sets) published in our [SAS paper](https://yuleisui.github.io/publications/sas21.pdf) is now available in SVF \u003c/b\u003e\n* \u003cb\u003e Learning or teaching Software Analysis? Check out [SVF-Teaching](https://github.com/SVF-tools/SVF-Teaching)! \u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-12.0.0 (Thank [Xiyu Yang](https://github.com/sherlly/) for her help!). \u003c/b\u003e\n* \u003cb\u003e[VSFS](https://github.com/SVF-tools/SVF/wiki/VSFS) published in our [CGO paper](https://yuleisui.github.io/publications/cgo21.pdf) is now available in SVF \u003c/b\u003e\n* \u003cb\u003e[TypeClone](https://github.com/SVF-tools/SVF/wiki/TypeClone) published in our [ECOOP paper](https://yuleisui.github.io/publications/ecoop20.pdf) is now available in SVF \u003c/b\u003e\n* \u003cb\u003eSVF now uses a single script for its build. Just type [`source ./build.sh`](https://github.com/SVF-tools/SVF/blob/master/build.sh) in your terminal, that's it!\u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-10.0.0! \u003c/b\u003e\n* \u003cb\u003eWe thank [bsauce](https://github.com/bsauce) for writing a user manual of SVF ([link1](https://www.jianshu.com/p/068a08ec749c) and [link2](https://www.jianshu.com/p/777c30d4240e)) in Chinese \u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-9.0.0 (Thank [Byoungyoung Lee](https://github.com/SVF-tools/SVF/issues/142) for his help!). \u003c/b\u003e\n* \u003cb\u003eSVF now supports a set of [field-sensitive pointer analyses](https://yuleisui.github.io/publications/sas2019a.pdf). \u003c/b\u003e\n* \u003cb\u003e[Use SVF as an external lib](https://github.com/SVF-tools/SVF-example) for your own project (Contributed by [Hongxu Chen](https://github.com/HongxuChen)). \u003c/b\u003e\n* \u003cb\u003eSVF now supports LLVM-7.0.0. \u003c/b\u003e\n* \u003cb\u003eSVF now supports Docker. [Try SVF in Docker](https://github.com/SVF-tools/SVF/wiki/Try-SVF-in-Docker)! \u003c/b\u003e\n* \u003cb\u003eSVF now supports [LLVM-6.0.0](https://github.com/svf-tools/SVF/pull/38) (Contributed by [Jack Anthony](https://github.com/jackanth)). \u003c/b\u003e\n* \u003cb\u003eSVF now supports [LLVM-4.0.0](https://github.com/svf-tools/SVF/pull/23) (Contributed by Jared Carlson. Thank [Jared](https://github.com/jcarlson23) and [Will](https://github.com/dtzWill) for their in-depth [discussions](https://github.com/svf-tools/SVF/pull/18) about updating SVF!) \u003c/b\u003e\n* \u003cb\u003eSVF now supports analysis for C++ programs.\u003c/b\u003e\n\u003cbr /\u003e\n\n## Documentation\n\n\u003cbr /\u003e\n\n\u003cb\u003eSVF\u003c/b\u003e is a static value-flow analysis tool for LLVM-based languages. \u003cb\u003eSVF\u003c/b\u003e ([CC'16](https://yuleisui.github.io/publications/cc16.pdf)) is able to perform\n* [AE](https://github.com/SVF-tools/SVF/tree/master/svf/include/AE) (\u003cb\u003eabstract execution\u003c/b\u003e): cross-domain execution ([ICSE'24](https://yuleisui.github.io/publications/icse24a.pdf)), recursion analysis ([ECOOP'25](https://yuleisui.github.io/publications/ecoop25.pdf)) typestate analysis ([FSE'24](https://yuleisui.github.io/publications/fse24a.pdf));\n* [WPA](https://github.com/SVF-tools/SVF/tree/master/svf/include/WPA) (\u003cb\u003ewhole program analysis\u003c/b\u003e): field-sensitive ([SAS'19](https://yuleisui.github.io/publications/sas2019a.pdf)), flow-sensitive ([CGO'21](https://yuleisui.github.io/publications/cgo21.pdf), [OOPSLA'21](https://yuleisui.github.io/publications/oopsla21.pdf)) analysis;\n* [DDA](https://github.com/SVF-tools/SVF/tree/master/svf/include/DDA) (\u003cb\u003edemand-driven analysis\u003c/b\u003e): flow-sensitive, context-sensitive points-to analysis ([FSE'16](https://yuleisui.github.io/publications/fse16.pdf), [TSE'18](https://yuleisui.github.io/publications/tse18.pdf));\n* [MSSA](https://github.com/SVF-tools/SVF/tree/master/svf/include/MSSA) (\u003cb\u003ememory SSA form construction\u003c/b\u003e): memory regions, side-effects, SSA form ([JSS'18](https://yuleisui.github.io/publications/jss18.pdf));\n* [SABER](https://github.com/SVF-tools/SVF/tree/master/svf/include/SABER) (\u003cb\u003ememory error checking\u003c/b\u003e): memory leaks and double-frees ([ISSTA'12](https://yuleisui.github.io/publications/issta12.pdf), [TSE'14](https://yuleisui.github.io/publications/tse14.pdf), [ICSE'18](https://yuleisui.github.io/publications/icse18a.pdf));\n* [MTA](https://github.com/SVF-tools/SVF/tree/master/svf/include/MTA) (\u003cb\u003eanalysis of multithreaded programs\u003c/b\u003e): value-flows for multithreaded programs ([CGO'16](https://yuleisui.github.io/publications/cgo16.pdf));\n* [CFL](https://github.com/SVF-tools/SVF/tree/master/svf/include/CFL) (\u003cb\u003econtext-free-reachability analysis\u003c/b\u003e): standard CFL solver, graph and grammar ([OOPSLA'22](https://yuleisui.github.io/publications/oopsla22.pdf), [PLDI'23](https://yuleisui.github.io/publications/pldi23.pdf));\n* [SVFIR](https://github.com/SVF-tools/SVF/tree/master/svf/include/SVFIR) and [MemoryModel](https://github.com/SVF-tools/SVF/tree/master/svf/include/MemoryModel) (\u003cb\u003eSVFIR\u003c/b\u003e): SVFIR, memory abstraction and points-to data structure ([SAS'21](https://yuleisui.github.io/publications/sas21.pdf));\n* [Graphs](https://github.com/SVF-tools/SVF/tree/master/svf/include/Graphs): \u003cb\u003e generating a variety of graphs\u003c/b\u003e, including call graph, ICFG, class hierarchy graph, constraint graph, value-flow graph for static analyses and code embedding ([OOPSLA'20](https://yuleisui.github.io/publications/oopsla20.pdf), [TOSEM'21](https://yuleisui.github.io/publications/tosem21.pdf))\n\n\u003cp\u003eWe release the SVF source code with the hope of benefiting the open-source community. You are kindly requested to acknowledge usage of the tool by referring to or citing relevant publications above. \u003c/p\u003e\n\n\u003cb\u003eSVF\u003c/b\u003e's doxygen document is available [here](https://svf-tools.github.io/SVF-doxygen/html).\n\n\u003cbr /\u003e\n\n| About SVF       | Setup  Guide         | User Guide  | Developer Guide  |\n| ------------- |:-------------:| -----:|-----:|\n| ![About](https://github.com/svf-tools/SVF/blob/master/docs/images/help.png?raw=true)| ![Setup](https://github.com/svf-tools/SVF/blob/master/docs/images/tools.png?raw=true)  | ![User](https://github.com/svf-tools/SVF/blob/master/docs/images/users.png?raw=true)  |  ![Developer](https://github.com/svf-tools/SVF/blob/master/docs/images/database.png?raw=true) \n| Introducing SVF -- [what it does](https://github.com/svf-tools/SVF/wiki/About#what-is-svf) and [how we design it](https://github.com/svf-tools/SVF/wiki/SVF-Design#svf-design)      | A step by step [setup guide](https://github.com/svf-tools/SVF/wiki/Setup-Guide#getting-started) to build SVF | Command-line options to [run SVF](https://github.com/svf-tools/SVF/wiki/User-Guide#quick-start), get [analysis outputs](https://github.com/svf-tools/SVF/wiki/User-Guide#analysis-outputs), and test SVF with [an example](https://github.com/svf-tools/SVF/wiki/Analyze-a-Simple-C-Program) or [PTABen](https://github.com/SVF-tools/PTABen) | Detailed [technical documentation](https://github.com/svf-tools/SVF/wiki/Technical-documentation) and how to [write your own analyses](https://github.com/svf-tools/SVF/wiki/Write-your-own-analysis-in-SVF) in SVF or [use SVF as a lib](https://github.com/SVF-tools/SVF-example) for your tool, and the [course](https://github.com/SVF-tools/Software-Security-Analysis) on SVF  |\n\n\u003cbr /\u003e\n\n\n","funding_links":[],"categories":["Programming Languages"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/svf-tools.github.io%2FSVF%2F","html_url":"https://awesome.ecosyste.ms/projects/svf-tools.github.io%2FSVF%2F","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/svf-tools.github.io%2FSVF%2F/lists"}