Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. CTF
  3. cwe_checker

cwe_checker

LGPL-3.0Rustv0.9

A static analysis tool that detects Common Weakness Enumerations (CWEs) in binary executables across multiple CPU architectures.

Visit WebsiteGitHubGitHub
1.3k stars141 forks0 contributors

What is cwe_checker?

cwe_checker is a suite of static analysis checks designed to detect common bug classes and vulnerabilities in binary executables. It focuses on ELF binaries commonly found on Linux and Unix systems, making it a valuable tool for firmware analysis and security auditing. The tool uses Ghidra to disassemble binaries into a common intermediate representation, enabling analysis across various CPU architectures like x86, ARM, MIPS, and PPC.

Target Audience

Security analysts and firmware reverse engineers who need to quickly identify potentially vulnerable code paths in binary executables, particularly those working with embedded systems or Linux/Unix binaries.

Value Proposition

Developers choose cwe_checker for its multi-architecture support through Ghidra integration, extensive CWE coverage with configurable analyses, and easy setup via Docker. Its plugin-based architecture and ability to annotate results directly in Ghidra streamline the security auditing workflow.

Overview

cwe_checker finds vulnerable patterns in binary executables

Use Cases

Best For

  • Security auditing of Linux and Unix ELF binaries across multiple CPU architectures (x86, ARM, MIPS, PPC).
  • Firmware analysis for embedded devices where source code is unavailable.
  • Identifying specific vulnerability classes like buffer overflows, null pointer dereferences, and use-after-free in binaries.
  • Integrating static binary analysis into larger security toolchains like FACT.
  • Analyzing bare-metal binaries with experimental support for custom configurations.
  • Manual reverse engineering in Ghidra with automated CWE annotation for faster vulnerability discovery.

Not Ideal For

  • Security teams analyzing Windows PE or macOS Mach-O binaries
  • Projects requiring dynamic analysis to catch runtime-only vulnerabilities
  • High-assurance audits where zero false positives are mandatory
  • Environments that cannot install Ghidra or use Docker containers

Pros & Cons

Pros

Multi-Architecture Analysis

Leverages Ghidra to disassemble and analyze ELF binaries across x86, ARM, MIPS, and PPC, making it versatile for embedded firmware and cross-platform security audits.

Comprehensive CWE Detection

Implements checks for over 15 CWEs including buffer overflows, use-after-free, and integer overflows, providing broad coverage of common vulnerability classes as listed in the README.

Easy Docker Deployment

Offers pre-built Docker images for quick setup, with the README highlighting that it is 'very easy to set up, just build the Docker container!' for consistent environments.

Ghidra Integration Plugin

Includes a script to annotate findings directly in Ghidra, streamlining manual reverse engineering by visualizing CWE warnings in the disassembler interface.

Cons

ELF-Only Limitation

Primarily supports ELF binaries common in Linux/Unix systems, excluding other executable formats like Windows PE, which restricts its use in heterogeneous environments.

Inherent Analysis Inaccuracy

The README explicitly states that 'false positives and false negatives are to be expected,' reducing reliability for precision-critical security validation.

Ghidra Dependency Burden

Local installation requires Ghidra, a large Java-based tool, adding complexity and potential compatibility issues compared to lightweight standalone analyzers.

Frequently Asked Questions

Quick Stats

Stars1,334
Forks141
Contributors0
Open Issues21
Last commit1 year ago
CreatedSince 2018

Tags

#multi-architecture#ghidra#vulnerability-detection#security#vulnerability-scanner#program-analysis#binary-analysis#firmware-analysis#security-auditing#static-analysis#reverse-engineering#security-scanner#static-analyzer

Built With

R
Rust
D
Docker

Links & Resources

Website

Included in

Static Analysis & Code Quality14.5kCTF11.4kOCaml3.1kEmbedded and IoT Security2.3k
Auto-fetched 1 day ago

Related Projects

jadxjadx

Dex to Java decompiler

Stars48,323
Forks5,506
Last commit2 days ago
GitleaksGitleaks

Find secrets with Gitleaks 🔑

Stars26,488
Forks2,014
Last commit1 month ago
radare2radare2

UNIX-like reverse engineering framework and command-line toolset

Stars23,579
Forks3,211
Last commit1 day ago
BinwalkBinwalk

Firmware Analysis Tool

Stars13,907
Forks1,794
Last commit20 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub