How to Install and Uninstall cppcheck Package on Kali Linux
Last updated: November 05,2024
1. Install "cppcheck" package
Please follow the steps below to install cppcheck on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
cppcheck
Copied
2. Uninstall "cppcheck" package
Please follow the steps below to uninstall cppcheck on Kali Linux:
$
sudo apt remove
cppcheck
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the cppcheck package on Kali Linux
Package: cppcheck
Source: cppcheck (2.13.0-2)
Version: 2.13.0-2+b1
Installed-Size: 10227
Maintainer: Joachim Reichel
Architecture: amd64
Depends: libc6 (>= 2.35), libgcc-s1 (>= 3.0), libstdc++6 (>= 13.1), libtinyxml2-10 (>= 10.0.0), python3:any, python3-pygments
Suggests: cppcheck-gui, clang, clang-tidy
Size: 2246264
SHA256: 4813a27ea69bcc4784cb10f0116055a05357423e3e80a8b509a8fe6ccec6b7a4
SHA1: fe52b8c1be35641e62cdafd0bf09c50fe84f5e78
MD5sum: 51dca947e2f21be5e95cfdbb0244f49b
Description: tool for static C/C++ code analysis (CLI)
Cppcheck is a command-line tool that tries to detect bugs that your
C/C++ compiler doesn't see. It is versatile, and can check non-standard
code including various compiler extensions, inline assembly code, etc.
Its internal preprocessor can handle includes, macros, and several
preprocessor commands. While Cppcheck is highly configurable,
you can start using it just by giving it a path to the source code.
.
It includes checks for:
* pointers to out-of-scope auto variables;
* assignment of auto variables to an effective parameter of a function;
* out-of-bounds errors in arrays and STL;
* missing class constructors;
* variables not initialized by a constructor;
* use of memset, memcpy, etcetera on a class;
* non-virtual destructors for base classes;
* operator= not returning a constant reference to itself;
* use of deprecated functions (mktemp, gets, scanf);
* exceptions thrown in destructors;
* memory leaks in class or function variables;
* C-style pointer cast in C++ code;
* redundant if;
* misuse of the strtol or sprintf functions;
* unsigned division or division by zero;
* unused functions and struct members;
* passing parameters by value;
* misuse of signed char variables;
* unusual pointer arithmetic (such as "abc" + 'd');
* dereferenced null pointers;
* incomplete statements;
* misuse of iterators when iterating through a container;
* dereferencing of erased iterators;
* use of invalidated vector iterators/pointers;
.
This package contains the command-line interface for cppcheck.
Description-md5:
Homepage: https://sourceforge.net/p/cppcheck/wiki/Home/
Tag: devel::lang:c, devel::lang:c++, devel::library, devel::testing-qa,
implemented-in::c, implemented-in::c++, interface::commandline,
role::devel-lib, role::program, scope::utility, security::TODO,
use::analysing, use::checking, works-with::software:source
Section: devel
Priority: optional
Filename: pool/main/c/cppcheck/cppcheck_2.13.0-2+b1_amd64.deb
Source: cppcheck (2.13.0-2)
Version: 2.13.0-2+b1
Installed-Size: 10227
Maintainer: Joachim Reichel
Architecture: amd64
Depends: libc6 (>= 2.35), libgcc-s1 (>= 3.0), libstdc++6 (>= 13.1), libtinyxml2-10 (>= 10.0.0), python3:any, python3-pygments
Suggests: cppcheck-gui, clang, clang-tidy
Size: 2246264
SHA256: 4813a27ea69bcc4784cb10f0116055a05357423e3e80a8b509a8fe6ccec6b7a4
SHA1: fe52b8c1be35641e62cdafd0bf09c50fe84f5e78
MD5sum: 51dca947e2f21be5e95cfdbb0244f49b
Description: tool for static C/C++ code analysis (CLI)
Cppcheck is a command-line tool that tries to detect bugs that your
C/C++ compiler doesn't see. It is versatile, and can check non-standard
code including various compiler extensions, inline assembly code, etc.
Its internal preprocessor can handle includes, macros, and several
preprocessor commands. While Cppcheck is highly configurable,
you can start using it just by giving it a path to the source code.
.
It includes checks for:
* pointers to out-of-scope auto variables;
* assignment of auto variables to an effective parameter of a function;
* out-of-bounds errors in arrays and STL;
* missing class constructors;
* variables not initialized by a constructor;
* use of memset, memcpy, etcetera on a class;
* non-virtual destructors for base classes;
* operator= not returning a constant reference to itself;
* use of deprecated functions (mktemp, gets, scanf);
* exceptions thrown in destructors;
* memory leaks in class or function variables;
* C-style pointer cast in C++ code;
* redundant if;
* misuse of the strtol or sprintf functions;
* unsigned division or division by zero;
* unused functions and struct members;
* passing parameters by value;
* misuse of signed char variables;
* unusual pointer arithmetic (such as "abc" + 'd');
* dereferenced null pointers;
* incomplete statements;
* misuse of iterators when iterating through a container;
* dereferencing of erased iterators;
* use of invalidated vector iterators/pointers;
.
This package contains the command-line interface for cppcheck.
Description-md5:
Homepage: https://sourceforge.net/p/cppcheck/wiki/Home/
Tag: devel::lang:c, devel::lang:c++, devel::library, devel::testing-qa,
implemented-in::c, implemented-in::c++, interface::commandline,
role::devel-lib, role::program, scope::utility, security::TODO,
use::analysing, use::checking, works-with::software:source
Section: devel
Priority: optional
Filename: pool/main/c/cppcheck/cppcheck_2.13.0-2+b1_amd64.deb