Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/gnurobbo-0.68+dfsg/win32/dirent.h
Examining data/gnurobbo-0.68+dfsg/font.c
Examining data/gnurobbo-0.68+dfsg/font.h
Examining data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c
Examining data/gnurobbo-0.68+dfsg/tools/catutf8.c
Examining data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c
Examining data/gnurobbo-0.68+dfsg/tools/lvldump.c
Examining data/gnurobbo-0.68+dfsg/tools/fcp.c
Examining data/gnurobbo-0.68+dfsg/locales.h
Examining data/gnurobbo-0.68+dfsg/locales.c
Examining data/gnurobbo-0.68+dfsg/sound.h
Examining data/gnurobbo-0.68+dfsg/sound.c
Examining data/gnurobbo-0.68+dfsg/rcfile.h
Examining data/gnurobbo-0.68+dfsg/rcfile.c
Examining data/gnurobbo-0.68+dfsg/skins.c
Examining data/gnurobbo-0.68+dfsg/skins.h
Examining data/gnurobbo-0.68+dfsg/ROB_engine.h
Examining data/gnurobbo-0.68+dfsg/board.h
Examining data/gnurobbo-0.68+dfsg/controls.h
Examining data/gnurobbo-0.68+dfsg/game.h
Examining data/gnurobbo-0.68+dfsg/konstruktor.h
Examining data/gnurobbo-0.68+dfsg/levels.h
Examining data/gnurobbo-0.68+dfsg/pointer_controls.h
Examining data/gnurobbo-0.68+dfsg/screen.h
Examining data/gnurobbo-0.68+dfsg/controls.c
Examining data/gnurobbo-0.68+dfsg/screen.c
Examining data/gnurobbo-0.68+dfsg/game.c
Examining data/gnurobbo-0.68+dfsg/levels.c
Examining data/gnurobbo-0.68+dfsg/board.c
Examining data/gnurobbo-0.68+dfsg/konstruktor.c
Examining data/gnurobbo-0.68+dfsg/pointer_controls.c
Examining data/gnurobbo-0.68+dfsg/ROB_engine.c

FINAL RESULTS:

data/gnurobbo-0.68+dfsg/ROB_engine.c:128:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(filename, PACKAGE_DATA_DIR "/" ROB_DIR "/");
data/gnurobbo-0.68+dfsg/ROB_engine.c:129:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(filename, ROB_SPRITES);
data/gnurobbo-0.68+dfsg/ROB_engine.c:250:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:253:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: target is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:345:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:348:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: Too many objects (max %i)", __func__, ROB_MAX_OBJECTS);
data/gnurobbo-0.68+dfsg/ROB_engine.c:354:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(rob_last_error, "%s: Invalid duplicate id property", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:452:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:503:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (last_error, rob_last_error);
data/gnurobbo-0.68+dfsg/ROB_engine.c:562:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: pob is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:599:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: ancestor is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:640:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: There is no object to free", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:643:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:771:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(rob_last_error, "%s: Cannot fill surface: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:800:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(rob_last_error, "%s: Cannot set surface alpha: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:809:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(rob_last_error, "%s: Cannot blit surface: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:820:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(rob_last_error, "%s: Cannot set surface alpha: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:846:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: Cannot set surface alpha: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:852:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(rob_last_error, "%s: Cannot fill surface: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:859:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(rob_last_error, "%s: Cannot blit surface: %s", __func__, SDL_GetError());
data/gnurobbo-0.68+dfsg/ROB_engine.c:877:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:907:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:950:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:993:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1027:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1029:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: hitpoint is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1064:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: object is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1066:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: target is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1309:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: event is invalid", __func__);
data/gnurobbo-0.68+dfsg/ROB_engine.c:1329:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(rob_last_error, "%s: event is invalid", func);
data/gnurobbo-0.68+dfsg/board.c:2224:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		      system ("sync");
data/gnurobbo-0.68+dfsg/controls.c:1110:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_ptr_BtnLeft);
data/gnurobbo-0.68+dfsg/controls.c:1113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_ptr_BtnMiddle);
data/gnurobbo-0.68+dfsg/controls.c:1116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_ptr_BtnRight);
data/gnurobbo-0.68+dfsg/controls.c:1119:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_ptr_WheelUp);
data/gnurobbo-0.68+dfsg/controls.c:1122:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_ptr_WheelDown);
data/gnurobbo-0.68+dfsg/controls.c:1137:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Backspace);
data/gnurobbo-0.68+dfsg/controls.c:1140:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Tab);
data/gnurobbo-0.68+dfsg/controls.c:1143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Clear);
data/gnurobbo-0.68+dfsg/controls.c:1146:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Return);
data/gnurobbo-0.68+dfsg/controls.c:1149:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Pause);
data/gnurobbo-0.68+dfsg/controls.c:1152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Escape);
data/gnurobbo-0.68+dfsg/controls.c:1155:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Space);
data/gnurobbo-0.68+dfsg/controls.c:1347:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Delete);
data/gnurobbo-0.68+dfsg/controls.c:1350:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s0", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1353:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s1", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1356:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s2", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1359:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s3", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1362:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s4", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1365:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s5", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1368:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s6", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1371:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s7", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1374:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s8", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1377:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s9", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1380:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s.", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1383:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s/", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1386:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s*", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1389:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s-", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1392:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s+", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1395:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%sEnter", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1398:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (text, "%s=", txt_key_KP);
data/gnurobbo-0.68+dfsg/controls.c:1401:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Up);
data/gnurobbo-0.68+dfsg/controls.c:1404:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Down);
data/gnurobbo-0.68+dfsg/controls.c:1407:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Right);
data/gnurobbo-0.68+dfsg/controls.c:1410:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Left);
data/gnurobbo-0.68+dfsg/controls.c:1413:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Insert);
data/gnurobbo-0.68+dfsg/controls.c:1416:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Home);
data/gnurobbo-0.68+dfsg/controls.c:1419:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_End);
data/gnurobbo-0.68+dfsg/controls.c:1422:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_PgUp);
data/gnurobbo-0.68+dfsg/controls.c:1425:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_PgDn);
data/gnurobbo-0.68+dfsg/controls.c:1473:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_NumLk);
data/gnurobbo-0.68+dfsg/controls.c:1476:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_CapsLk);
data/gnurobbo-0.68+dfsg/controls.c:1479:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_ScrlLk);
data/gnurobbo-0.68+dfsg/controls.c:1482:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_RShift);
data/gnurobbo-0.68+dfsg/controls.c:1485:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_LShift);
data/gnurobbo-0.68+dfsg/controls.c:1488:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_RCtrl);
data/gnurobbo-0.68+dfsg/controls.c:1491:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_LCtrl);
data/gnurobbo-0.68+dfsg/controls.c:1494:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_RAlt);
data/gnurobbo-0.68+dfsg/controls.c:1497:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_LAlt);
data/gnurobbo-0.68+dfsg/controls.c:1500:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_RMeta);
data/gnurobbo-0.68+dfsg/controls.c:1503:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_LMeta);
data/gnurobbo-0.68+dfsg/controls.c:1506:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_LSuper);
data/gnurobbo-0.68+dfsg/controls.c:1509:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_RSuper);
data/gnurobbo-0.68+dfsg/controls.c:1512:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_AltGr);
data/gnurobbo-0.68+dfsg/controls.c:1515:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Compose);
data/gnurobbo-0.68+dfsg/controls.c:1518:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Help);
data/gnurobbo-0.68+dfsg/controls.c:1521:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_PrScr);
data/gnurobbo-0.68+dfsg/controls.c:1524:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_SysRq);
data/gnurobbo-0.68+dfsg/controls.c:1527:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Break);
data/gnurobbo-0.68+dfsg/controls.c:1530:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Menu);
data/gnurobbo-0.68+dfsg/controls.c:1533:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Power);
data/gnurobbo-0.68+dfsg/controls.c:1536:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Euro);
data/gnurobbo-0.68+dfsg/controls.c:1539:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (text, txt_key_Undo);
data/gnurobbo-0.68+dfsg/game.c:330:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (level_packs[selected_pack].filename, PACKAGE_DATA_DIR "/" LEVELS_DIR "/" DEFAULT_LEVEL_PACK);
data/gnurobbo-0.68+dfsg/game.c:347:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (skins[selected_skin].foldername, DEFAULT_SKIN);
data/gnurobbo-0.68+dfsg/game.c:359:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (locales[selected_locale].foldername, DEFAULT_LOCALE);
data/gnurobbo-0.68+dfsg/game.c:374:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (path_resource_file, getenv("TEMP"));
data/gnurobbo-0.68+dfsg/game.c:376:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/game.c:381:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/game.c:384:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/game.c:389:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (path_resource_file, RESOURCE_FILE);
data/gnurobbo-0.68+dfsg/game.c:542:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system (vmusage);
data/gnurobbo-0.68+dfsg/game.c:1250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy (temp_msg_box.name, MESSAGE_BOX_GETKEY_ERROR_ID);
data/gnurobbo-0.68+dfsg/game.c:1251:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy (temp_msg_box.message, txt_No_input_was_detected);
data/gnurobbo-0.68+dfsg/game.c:2215:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	      system ("sync");
data/gnurobbo-0.68+dfsg/game.c:2222:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.name, MESSAGE_BOX_SAVING_ID);
data/gnurobbo-0.68+dfsg/game.c:2223:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.message, txt_Changes_saved);
data/gnurobbo-0.68+dfsg/game.c:2256:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.name, MESSAGE_BOX_RESTORE_ID);
data/gnurobbo-0.68+dfsg/game.c:2257:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.message, txt_Default_controls_restored);
data/gnurobbo-0.68+dfsg/game.c:2271:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.name, MESSAGE_BOX_GETKEY_ID);
data/gnurobbo-0.68+dfsg/game.c:2272:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (temp_msg_box.message, txt_Press_something_and_release);
data/gnurobbo-0.68+dfsg/konstruktor.c:260:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(infostring, "%s", txt_konstruktor_Welcome_to_GNU_Robbo_Designer);
data/gnurobbo-0.68+dfsg/konstruktor.c:669:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:674:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", "Robbo");
data/gnurobbo-0.68+dfsg/konstruktor.c:701:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", txt_konstruktor_Ground);
data/gnurobbo-0.68+dfsg/konstruktor.c:704:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:710:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:716:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:722:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:729:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:734:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:741:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:747:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:753:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "? (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:758:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", txt_konstruktor_Empty_Field);
data/gnurobbo-0.68+dfsg/konstruktor.c:761:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:773:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:780:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:787:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:796:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Wall);
data/gnurobbo-0.68+dfsg/konstruktor.c:798:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Black_Wall);
data/gnurobbo-0.68+dfsg/konstruktor.c:803:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:817:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:826:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:836:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:841:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:851:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:858:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:866:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%dx9 %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:893:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring,"%s (%d - %d)",txt_konstruktor_Screws,robbo.screws,k_count_obj(SCREW));
data/gnurobbo-0.68+dfsg/konstruktor.c:902:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring,"%s (%d - %d)",txt_konstruktor_Screws,robbo.screws,k_count_obj(SCREW));
data/gnurobbo-0.68+dfsg/konstruktor.c:910:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:918:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Level_reloaded);
data/gnurobbo-0.68+dfsg/konstruktor.c:936:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:943:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:950:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:957:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:964:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", "Robbo");
data/gnurobbo-0.68+dfsg/konstruktor.c:968:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:975:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:982:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:989:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:999:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1004:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1012:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1019:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%dx9 %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1026:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1033:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1040:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1047:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1054:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1061:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", txt_konstruktor_Empty_Field);
data/gnurobbo-0.68+dfsg/konstruktor.c:1068:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Wall);
data/gnurobbo-0.68+dfsg/konstruktor.c:1070:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Black_Wall);
data/gnurobbo-0.68+dfsg/konstruktor.c:1074:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1081:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1091:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s", txt_konstruktor_Ground);
data/gnurobbo-0.68+dfsg/konstruktor.c:1095:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "%s (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1105:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(infostring, "? (%d %s)",
data/gnurobbo-0.68+dfsg/konstruktor.c:1114:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Direction_right);
data/gnurobbo-0.68+dfsg/konstruktor.c:1117:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Direction_down);
data/gnurobbo-0.68+dfsg/konstruktor.c:1120:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Direction_left);
data/gnurobbo-0.68+dfsg/konstruktor.c:1123:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Direction_up);
data/gnurobbo-0.68+dfsg/konstruktor.c:1132:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Laser_Gun);
data/gnurobbo-0.68+dfsg/konstruktor.c:1135:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Blaster_Gun);
data/gnurobbo-0.68+dfsg/konstruktor.c:1138:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Regular_Gun);
data/gnurobbo-0.68+dfsg/konstruktor.c:1149:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Fixed);
data/gnurobbo-0.68+dfsg/konstruktor.c:1152:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Moveable);
data/gnurobbo-0.68+dfsg/konstruktor.c:1155:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Rotating);
data/gnurobbo-0.68+dfsg/konstruktor.c:1158:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(infostring, "%s", txt_konstruktor_Moveable_Rotating);
data/gnurobbo-0.68+dfsg/konstruktor.c:1165:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Level_created);
data/gnurobbo-0.68+dfsg/konstruktor.c:1189:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:1200:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s", txt_konstruktor_Level_cleared);
data/gnurobbo-0.68+dfsg/konstruktor.c:1219:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:1228:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s", txt_konstruktor_New_level_appended_to_pack);
data/gnurobbo-0.68+dfsg/konstruktor.c:1230:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s", txt_konstruktor_Changes_saved);
data/gnurobbo-0.68+dfsg/konstruktor.c:1241:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:1244:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:1260:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s 16x31",
data/gnurobbo-0.68+dfsg/konstruktor.c:1267:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s 32x31",
data/gnurobbo-0.68+dfsg/konstruktor.c:1310:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(infostring, "%s",
data/gnurobbo-0.68+dfsg/konstruktor.c:1802:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname, "%s", level_packs[selected_pack].filename);
data/gnurobbo-0.68+dfsg/konstruktor.c:1803:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname2, "%s%s", level_packs[selected_pack].filename, ".tmp");
data/gnurobbo-0.68+dfsg/levels.c:213:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (fullpath, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:214:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (fullpath, "/" LOCAL_DATA_DIR "/" LEVELS_DIR "/" DEFAULT_USER_LEVEL_PACK);
data/gnurobbo-0.68+dfsg/levels.c:216:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (fullpath, PACKAGE_DATA_DIR "/" LEVELS_DIR "/" DEFAULT_USER_LEVEL_PACK);
data/gnurobbo-0.68+dfsg/levels.c:230:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (foldername, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:231:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (foldername, "/" LOCAL_DATA_DIR);
data/gnurobbo-0.68+dfsg/levels.c:233:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (foldername, "/" LEVELS_DIR);
data/gnurobbo-0.68+dfsg/levels.c:328:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (foldername, PACKAGE_DATA_DIR "/" LEVELS_DIR);
data/gnurobbo-0.68+dfsg/levels.c:334:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy (foldername, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:335:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (foldername, "/" LOCAL_DATA_DIR "/" LEVELS_DIR);
data/gnurobbo-0.68+dfsg/levels.c:365:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							strcpy (level_packs[level_pack_count].filename,
data/gnurobbo-0.68+dfsg/levels.c:369:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
							strcat (level_packs[level_pack_count].filename,
data/gnurobbo-0.68+dfsg/levels.c:410:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (filename, level_packs[count].filename);
data/gnurobbo-0.68+dfsg/levels.c:415:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (level_packs[count].name, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/levels.c:452:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy (level_packs[count].name, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/levels.c:593:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (filename, level_packs[selected_pack].filename);
data/gnurobbo-0.68+dfsg/levels.c:757:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat (level.notes, line);
data/gnurobbo-0.68+dfsg/locales.c:271:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy (filename, PACKAGE_DATA_DIR "/" LOCALES_DIR "/");
data/gnurobbo-0.68+dfsg/locales.c:272:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (filename, currentdirent->d_name);
data/gnurobbo-0.68+dfsg/locales.c:274:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (filename, LOCALERC_FILE);
data/gnurobbo-0.68+dfsg/locales.c:375:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (locales[count].name, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/locales.c:376:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (locales[count].author, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/locales.c:378:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (filename, PACKAGE_DATA_DIR "/" LOCALES_DIR "/");
data/gnurobbo-0.68+dfsg/locales.c:379:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, locales[count].foldername);
data/gnurobbo-0.68+dfsg/locales.c:381:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, LOCALERC_FILE);
data/gnurobbo-0.68+dfsg/locales.c:934:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (&(config_items[count].destination)
data/gnurobbo-0.68+dfsg/locales.c:948:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (filename, PACKAGE_DATA_DIR "/" LOCALES_DIR "/");
data/gnurobbo-0.68+dfsg/locales.c:949:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (filename, locales[selected_locale].foldername);
data/gnurobbo-0.68+dfsg/locales.c:951:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (filename, LOCALE_TEXT_FILE);
data/gnurobbo-0.68+dfsg/rcfile.c:114:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	while (fscanf (fp, "%s", line) == 1)
data/gnurobbo-0.68+dfsg/rcfile.c:172:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			fscanf (fp, "%s", read_selected_skin);
data/gnurobbo-0.68+dfsg/rcfile.c:176:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			fscanf (fp, "%s", read_selected_locale);
data/gnurobbo-0.68+dfsg/rcfile.c:209:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				fscanf (fp, "%s", read_level_packs[read_pack_count].filename);
data/gnurobbo-0.68+dfsg/rcfile.c:769:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (default_joystick_name, read_default_joystick_name);
data/gnurobbo-0.68+dfsg/rcfile.c:862:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (level_packs[level_pack_count].filename,
data/gnurobbo-0.68+dfsg/screen.c:1772:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tempstring, "%s", &level.author[1]);
data/gnurobbo-0.68+dfsg/screen.c:1776:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tempstring, "%s: %s", txt_Level_Author, level.author);
data/gnurobbo-0.68+dfsg/screen.c:2712:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tempstring, "%i %s %i",
data/gnurobbo-0.68+dfsg/screen.c:3245:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (tempstring, "%s", txt_Exit);
data/gnurobbo-0.68+dfsg/screen.c:3272:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tempstring, "%s >", txt_Next);
data/gnurobbo-0.68+dfsg/screen.c:3301:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf (tempstring, "< %s", txt_Back);
data/gnurobbo-0.68+dfsg/screen.c:3902:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "< %s", txt_Back);
data/gnurobbo-0.68+dfsg/screen.c:3963:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s >", txt_Next);
data/gnurobbo-0.68+dfsg/screen.c:4029:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Fast);
data/gnurobbo-0.68+dfsg/screen.c:4031:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Normal);
data/gnurobbo-0.68+dfsg/screen.c:4033:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Slow);
data/gnurobbo-0.68+dfsg/screen.c:4096:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (tempstring, txt_No_joystick_found);
data/gnurobbo-0.68+dfsg/screen.c:4102:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat (tempstring,
data/gnurobbo-0.68+dfsg/screen.c:4399:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Translation_by);
data/gnurobbo-0.68+dfsg/screen.c:4467:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_On_Exit);
data/gnurobbo-0.68+dfsg/screen.c:4469:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_On_Change);
data/gnurobbo-0.68+dfsg/screen.c:4587:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Disabled);
data/gnurobbo-0.68+dfsg/screen.c:4589:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Enabled);
data/gnurobbo-0.68+dfsg/screen.c:4649:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Viewport);
data/gnurobbo-0.68+dfsg/screen.c:4652:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Screen);
data/gnurobbo-0.68+dfsg/screen.c:4681:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Sound);
data/gnurobbo-0.68+dfsg/screen.c:4707:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s",  txt_Disabled);
data/gnurobbo-0.68+dfsg/screen.c:4709:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s",  txt_Enabled);
data/gnurobbo-0.68+dfsg/screen.c:4740:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", txt_Sfx_Volume);
data/gnurobbo-0.68+dfsg/screen.c:4802:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Up);
data/gnurobbo-0.68+dfsg/screen.c:4806:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Up_Right);
data/gnurobbo-0.68+dfsg/screen.c:4810:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Right);
data/gnurobbo-0.68+dfsg/screen.c:4814:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Down_Right);
data/gnurobbo-0.68+dfsg/screen.c:4818:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Down);
data/gnurobbo-0.68+dfsg/screen.c:4822:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Down_Left);
data/gnurobbo-0.68+dfsg/screen.c:4826:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Left);
data/gnurobbo-0.68+dfsg/screen.c:4830:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Move_Up_Left);
data/gnurobbo-0.68+dfsg/screen.c:4834:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Restart);
data/gnurobbo-0.68+dfsg/screen.c:4838:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Shoot_Up);
data/gnurobbo-0.68+dfsg/screen.c:4842:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Shoot_Down);
data/gnurobbo-0.68+dfsg/screen.c:4846:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Shoot_Left);
data/gnurobbo-0.68+dfsg/screen.c:4850:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Shoot_Right);
data/gnurobbo-0.68+dfsg/screen.c:4854:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Confirm);
data/gnurobbo-0.68+dfsg/screen.c:4858:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Exit);
data/gnurobbo-0.68+dfsg/screen.c:4862:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Help);
data/gnurobbo-0.68+dfsg/screen.c:4866:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Options);
data/gnurobbo-0.68+dfsg/screen.c:4870:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Toggle_Fullscreen);
data/gnurobbo-0.68+dfsg/screen.c:4874:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Previous_Level);
data/gnurobbo-0.68+dfsg/screen.c:4878:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Next_Level);
data/gnurobbo-0.68+dfsg/screen.c:4882:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Previous_Pack);
data/gnurobbo-0.68+dfsg/screen.c:4886:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Next_Pack);
data/gnurobbo-0.68+dfsg/screen.c:4890:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Home);
data/gnurobbo-0.68+dfsg/screen.c:4894:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_End);
data/gnurobbo-0.68+dfsg/screen.c:4898:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Page_Up);
data/gnurobbo-0.68+dfsg/screen.c:4902:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Page_Down);
data/gnurobbo-0.68+dfsg/screen.c:4906:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Toggle_Designer);
data/gnurobbo-0.68+dfsg/screen.c:4910:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Volume_Up);
data/gnurobbo-0.68+dfsg/screen.c:4914:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Volume_Down);
data/gnurobbo-0.68+dfsg/screen.c:4919:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s%i ", txt_Modifier,
data/gnurobbo-0.68+dfsg/screen.c:4924:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Scroll_Up);
data/gnurobbo-0.68+dfsg/screen.c:4928:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Scroll_Down);
data/gnurobbo-0.68+dfsg/screen.c:4932:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_Primary_Click);
data/gnurobbo-0.68+dfsg/screen.c:4936:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s %i", "Unknown", action);
data/gnurobbo-0.68+dfsg/screen.c:4956:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", "-");
data/gnurobbo-0.68+dfsg/screen.c:4958:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s: ", txt_Key);
data/gnurobbo-0.68+dfsg/screen.c:4960:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s: ", txt_Joy);
data/gnurobbo-0.68+dfsg/screen.c:4962:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s: ", txt_Ptr);
data/gnurobbo-0.68+dfsg/screen.c:4983:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", "-");
data/gnurobbo-0.68+dfsg/screen.c:5001:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", tempstring);
data/gnurobbo-0.68+dfsg/screen.c:5039:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s", "--");
data/gnurobbo-0.68+dfsg/screen.c:5043:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s%i", txt_Mod,
data/gnurobbo-0.68+dfsg/screen.c:5140:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (tempstring, "%s ", txt_By);
data/gnurobbo-0.68+dfsg/skins.c:121:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:122:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (filename, currentdirent->d_name);
data/gnurobbo-0.68+dfsg/skins.c:124:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	      strcat (filename, SKINRC_FILE);
data/gnurobbo-0.68+dfsg/skins.c:197:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].name, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:198:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].author, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:199:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].about[0], SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:200:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].about[1], SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:201:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].about[2], SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:202:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (skins[count].soundskin, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/skins.c:206:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:207:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, skins[count].foldername);
data/gnurobbo-0.68+dfsg/skins.c:209:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, SKINRC_FILE);
data/gnurobbo-0.68+dfsg/skins.c:508:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:509:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, skins[selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:511:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, SKINRC_FILE);
data/gnurobbo-0.68+dfsg/skins.c:704:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:705:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, skins[selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:707:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, SKINRC_FILE);
data/gnurobbo-0.68+dfsg/skins.c:941:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:942:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (filename, skins[selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:949:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_ICONS16);
data/gnurobbo-0.68+dfsg/skins.c:953:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_ICONS32);
data/gnurobbo-0.68+dfsg/skins.c:961:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_CIPHERS16);
data/gnurobbo-0.68+dfsg/skins.c:965:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_CIPHERS32);
data/gnurobbo-0.68+dfsg/skins.c:973:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_ALPHA16);
data/gnurobbo-0.68+dfsg/skins.c:977:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_ALPHA32);
data/gnurobbo-0.68+dfsg/skins.c:989:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_BGRD32);
data/gnurobbo-0.68+dfsg/skins.c:991:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(filename,IMG_BGRD16);
data/gnurobbo-0.68+dfsg/skins.c:997:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_KICONS32);
data/gnurobbo-0.68+dfsg/skins.c:999:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_KICONS16);
data/gnurobbo-0.68+dfsg/skins.c:1006:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_EFX32);
data/gnurobbo-0.68+dfsg/skins.c:1008:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat (filename, IMG_EFX16);
data/gnurobbo-0.68+dfsg/skins.c:1173:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:1174:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (filename, skins[selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:1176:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (filename, IMG_WM_ICON);
data/gnurobbo-0.68+dfsg/skins.c:1216:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:1217:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat (filename, skins[temp_selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:1223:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (filename, IMG_ICONS16);
data/gnurobbo-0.68+dfsg/skins.c:1227:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat (filename, IMG_ICONS32);
data/gnurobbo-0.68+dfsg/skins.c:1335:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy (filename, PACKAGE_DATA_DIR "/" SKINS_DIR "/");
data/gnurobbo-0.68+dfsg/skins.c:1336:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, skins[selected_skin].foldername);
data/gnurobbo-0.68+dfsg/skins.c:1343:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, IMG_FONT_LOWRES);
data/gnurobbo-0.68+dfsg/skins.c:1347:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat (filename, IMG_FONT_HIRES);
data/gnurobbo-0.68+dfsg/skins.c:1350:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat (filename, TTF_ROBBO);
data/gnurobbo-0.68+dfsg/sound.c:152:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tempstring, "%s: %i", txt_Volume, volume);
data/gnurobbo-0.68+dfsg/sound.c:153:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp_msg_box.name, MESSAGE_BOX_VOLUME_ID);
data/gnurobbo-0.68+dfsg/sound.c:154:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp_msg_box.message, tempstring);
data/gnurobbo-0.68+dfsg/sound.c:185:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tempstring, "%s: %i", txt_Volume, volume);
data/gnurobbo-0.68+dfsg/sound.c:186:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp_msg_box.name, MESSAGE_BOX_VOLUME_ID);
data/gnurobbo-0.68+dfsg/sound.c:187:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp_msg_box.message, tempstring);
data/gnurobbo-0.68+dfsg/sound.c:347:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname, "%s/%s/%s", PACKAGE_DATA_DIR, MUSIC_DIR,playlist[next_song].fname);
data/gnurobbo-0.68+dfsg/sound.c:371:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(musicpath, "%s/%s/", PACKAGE_DATA_DIR, MUSIC_DIR);
data/gnurobbo-0.68+dfsg/sound.c:427:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name, "%s/%s/skins/%s", PACKAGE_DATA_DIR, SOUNDS_DIR, fname);
data/gnurobbo-0.68+dfsg/sound.c:431:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(name, "%s/%s/skins/default.dat", PACKAGE_DATA_DIR,
data/gnurobbo-0.68+dfsg/sound.c:559:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fullpath, "%s/%s/%s", PACKAGE_DATA_DIR, SOUNDS_DIR,
data/gnurobbo-0.68+dfsg/sound.c:610:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sounds[c].fname, SINGLE_SPACE);
data/gnurobbo-0.68+dfsg/tools/catutf8.c:51:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(file1, argv[1]);
data/gnurobbo-0.68+dfsg/tools/fcp.c:42:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(file1, argv[1]);
data/gnurobbo-0.68+dfsg/tools/fcp.c:43:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(file2, argv[2]);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(filename, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(author_string, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:241:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:248:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:254:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:260:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:266:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:273:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:280:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:287:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:294:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:301:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:308:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:315:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:322:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:329:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:336:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:342:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:348:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:354:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:360:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:367:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:373:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:379:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:385:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:391:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:397:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:403:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:409:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:415:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:421:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:427:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:437:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:443:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:449:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:455:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:461:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:467:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:473:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:479:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:485:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:491:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:497:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:503:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:509:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:516:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:114:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(filename, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(author_string, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:239:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:245:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:251:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:258:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:265:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:272:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:279:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:286:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:293:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:300:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:307:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:314:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:322:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:328:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:334:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:340:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:349:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:355:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:361:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:367:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:373:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:379:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:385:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:391:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:397:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:403:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:409:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:415:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:423:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:429:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:435:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:441:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:447:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:453:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:459:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:465:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:471:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:477:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:483:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:489:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:496:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:503:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:136:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(filename, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(author_string, argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:292:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:298:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:304:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:311:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:318:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:325:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:332:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:339:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:346:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:353:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:360:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:367:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:375:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:381:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:387:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:393:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:402:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:408:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:414:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:420:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:426:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:432:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:438:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:444:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:450:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:456:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:462:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:468:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:476:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:482:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:488:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:494:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:500:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:506:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:512:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:518:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:524:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:530:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:536:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:542:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:549:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:556:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(additional, temp);
data/gnurobbo-0.68+dfsg/game.c:374:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy (path_resource_file, getenv("TEMP"));
data/gnurobbo-0.68+dfsg/game.c:376:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/game.c:381:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/game.c:384:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy (path_resource_file, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:213:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy (fullpath, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:230:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				strcpy (foldername, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/levels.c:334:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				strcpy (foldername, getenv ("HOME"));
data/gnurobbo-0.68+dfsg/locales.c:1051:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *envlang = getenv("LANG");
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:69:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned int)(tv.tv_usec));
data/gnurobbo-0.68+dfsg/tools/lvldump.c:67:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned int)(tv.tv_usec));
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:92:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned int)(tv.tv_usec));
data/gnurobbo-0.68+dfsg/ROB_engine.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rob_last_error[ROB_ERROR_LENGTH];
data/gnurobbo-0.68+dfsg/ROB_engine.c:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/ROB_engine.c:501:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char last_error[ROB_ERROR_LENGTH];
data/gnurobbo-0.68+dfsg/controls.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char default_joystick_name[MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/controls.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char joystick_list[MAX_JOYSTICKS][MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/controls.c:1040:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (joyname, "-1");
data/gnurobbo-0.68+dfsg/controls.c:1055:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int get_joystick_list (char joystick_list[MAX_JOYSTICKS][MAX_JOYSTICK_NAME_LENGTH],
data/gnurobbo-0.68+dfsg/controls.c:1084:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (joystick_list[number_found++], "Micro Shaft Pretend Joystick");
data/gnurobbo-0.68+dfsg/controls.c:1085:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (joystick_list[number_found++], "Grevious Gamepad Pro");
data/gnurobbo-0.68+dfsg/controls.c:1086:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (joystick_list[number_found++], "Cheapo Joypad");
data/gnurobbo-0.68+dfsg/controls.c:1125:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1134:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "SDLUnknown");
data/gnurobbo-0.68+dfsg/controls.c:1428:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F1");
data/gnurobbo-0.68+dfsg/controls.c:1431:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F2");
data/gnurobbo-0.68+dfsg/controls.c:1434:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F3");
data/gnurobbo-0.68+dfsg/controls.c:1437:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F4");
data/gnurobbo-0.68+dfsg/controls.c:1440:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F5");
data/gnurobbo-0.68+dfsg/controls.c:1443:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F6");
data/gnurobbo-0.68+dfsg/controls.c:1446:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F7");
data/gnurobbo-0.68+dfsg/controls.c:1449:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F8");
data/gnurobbo-0.68+dfsg/controls.c:1452:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F9");
data/gnurobbo-0.68+dfsg/controls.c:1455:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F10");
data/gnurobbo-0.68+dfsg/controls.c:1458:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F11");
data/gnurobbo-0.68+dfsg/controls.c:1461:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F12");
data/gnurobbo-0.68+dfsg/controls.c:1464:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F13");
data/gnurobbo-0.68+dfsg/controls.c:1467:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F14");
data/gnurobbo-0.68+dfsg/controls.c:1470:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy (text, "F15");
data/gnurobbo-0.68+dfsg/controls.c:1542:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1573:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "LTrig");
data/gnurobbo-0.68+dfsg/controls.c:1576:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "RTrig");
data/gnurobbo-0.68+dfsg/controls.c:1579:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Shift");
data/gnurobbo-0.68+dfsg/controls.c:1582:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Left");
data/gnurobbo-0.68+dfsg/controls.c:1585:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Right");
data/gnurobbo-0.68+dfsg/controls.c:1588:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Up");
data/gnurobbo-0.68+dfsg/controls.c:1591:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Down");
data/gnurobbo-0.68+dfsg/controls.c:1594:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1631:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "10");
data/gnurobbo-0.68+dfsg/controls.c:1634:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "11");
data/gnurobbo-0.68+dfsg/controls.c:1637:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "12");
data/gnurobbo-0.68+dfsg/controls.c:1640:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Left");
data/gnurobbo-0.68+dfsg/controls.c:1643:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Right");
data/gnurobbo-0.68+dfsg/controls.c:1646:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Up");
data/gnurobbo-0.68+dfsg/controls.c:1649:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Down");
data/gnurobbo-0.68+dfsg/controls.c:1652:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1661:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Up");
data/gnurobbo-0.68+dfsg/controls.c:1664:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "UpLeft");
data/gnurobbo-0.68+dfsg/controls.c:1667:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Left");
data/gnurobbo-0.68+dfsg/controls.c:1670:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "DownLeft");
data/gnurobbo-0.68+dfsg/controls.c:1673:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Down");
data/gnurobbo-0.68+dfsg/controls.c:1676:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "DownRight");
data/gnurobbo-0.68+dfsg/controls.c:1679:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Right");
data/gnurobbo-0.68+dfsg/controls.c:1682:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "UpRight");
data/gnurobbo-0.68+dfsg/controls.c:1685:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Start");
data/gnurobbo-0.68+dfsg/controls.c:1688:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "Select");
data/gnurobbo-0.68+dfsg/controls.c:1691:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "LTrig");
data/gnurobbo-0.68+dfsg/controls.c:1694:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "RTrig");
data/gnurobbo-0.68+dfsg/controls.c:1709:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "VolUp");
data/gnurobbo-0.68+dfsg/controls.c:1712:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "VolDn");
data/gnurobbo-0.68+dfsg/controls.c:1715:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy (text, "JoyPush");
data/gnurobbo-0.68+dfsg/controls.c:1718:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1725:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (text, "%i", id);
data/gnurobbo-0.68+dfsg/controls.c:1730:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (text, "%i", device);
data/gnurobbo-0.68+dfsg/controls.h:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char default_joystick_name[MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/controls.h:92:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char joystick_list[MAX_JOYSTICKS][MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/controls.h:125:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int get_joystick_list(char joystick_list[MAX_JOYSTICKS][MAX_JOYSTICK_NAME_LENGTH], int show);
data/gnurobbo-0.68+dfsg/game.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vmusage[80];
data/gnurobbo-0.68+dfsg/game.c:196:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (default_joystick_name, "-1");
data/gnurobbo-0.68+dfsg/game.c:331:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (level_packs[selected_pack].name, "-1");	/* We don't know yet */
data/gnurobbo-0.68+dfsg/game.c:379:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (path_resource_file, "./");
data/gnurobbo-0.68+dfsg/game.c:385:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat (path_resource_file, "/MyDocs/.gnurobbo/");
data/gnurobbo-0.68+dfsg/game.c:387:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (path_resource_file, "./");
data/gnurobbo-0.68+dfsg/game.c:541:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (vmusage, "cat /proc/%u/status | grep Vm", getpid ());
data/gnurobbo-0.68+dfsg/game.c:566:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(infostring, "Exit designer - select again to exit");
data/gnurobbo-0.68+dfsg/game.c:574:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(infostring,"  ");
data/gnurobbo-0.68+dfsg/game.c:2139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp_default_joystick_name[MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/game.c:2162:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		  strcpy (temp_default_joystick_name, "-1");
data/gnurobbo-0.68+dfsg/konstruktor.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            infostring[255];
data/gnurobbo-0.68+dfsg/konstruktor.c:1694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            line[1024];
data/gnurobbo-0.68+dfsg/konstruktor.c:1798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            line[1024];
data/gnurobbo-0.68+dfsg/konstruktor.c:1799:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fname[1024];
data/gnurobbo-0.68+dfsg/konstruktor.c:1800:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fname2[1024];
data/gnurobbo-0.68+dfsg/konstruktor.c:1805:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdescr = fopen(fname, "r");
data/gnurobbo-0.68+dfsg/konstruktor.c:1806:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdesc = fopen(fname2, "w+");
data/gnurobbo-0.68+dfsg/konstruktor.c:1847:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(line, "%d\n", maxlevel);
data/gnurobbo-0.68+dfsg/konstruktor.h:120:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char            infostring[255];
data/gnurobbo-0.68+dfsg/levels.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullpath[256];
data/gnurobbo-0.68+dfsg/levels.c:204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char foldername[256];
data/gnurobbo-0.68+dfsg/levels.c:222:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fp = fopen (fullpath, "r")) == NULL)
data/gnurobbo-0.68+dfsg/levels.c:240:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((fp = fopen (fullpath, "w")) == NULL)
data/gnurobbo-0.68+dfsg/levels.c:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foldername[256];
data/gnurobbo-0.68+dfsg/levels.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/gnurobbo-0.68+dfsg/levels.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/levels.c:411:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/levels.c:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256], symbol, line[1024];
data/gnurobbo-0.68+dfsg/levels.c:594:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/levels.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char author[60];		/* The text displayed on the authorline above the viewport */
data/gnurobbo-0.68+dfsg/levels.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char notes[1024];		/* This is displayed nowhere now, but contains information about notes */
data/gnurobbo-0.68+dfsg/levels.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];		/* e.g. /usr/local/share/gnurobbo/levels/original.dat or ~/.gnurobbo/levels/mylevels.dat */
data/gnurobbo-0.68+dfsg/levels.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[20];			/* e.g. Original */
data/gnurobbo-0.68+dfsg/locales.c:39:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_intro_story[TXT_INTRO_STORY_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:40:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_intro_keys[TXT_INTRO_KEYS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:41:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_intro_keys_description[TXT_INTRO_KEYS_DESCRIPTION_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_intro_menu[TXT_INTRO_MENU_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:43:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_of[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_intro_credits[TXT_INTRO_CREDITS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_help_page0[TXT_HELP_PAGE0_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:47:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_help_page1[TXT_HELP_PAGE1_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:48:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_help_page2[TXT_HELP_PAGE2_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_help_page3[TXT_HELP_PAGE3_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Back[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Next[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_options_page1[TXT_OPTIONS_PAGE1_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Save[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:56:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Game_Speed[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:57:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Fast[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Normal[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:59:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Slow[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Key_Repeat[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Delay[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:62:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Interval[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Default_Joystick[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_No_joystick_found[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Joystick_Axes_Dead_Zone[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Language[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Translation_by[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Save_Frequency[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_On_Exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_On_Change[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:71:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:72:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Up_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Down_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Down_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Move_Up_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Shoot_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Shoot_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Shoot_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Shoot_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Restart[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Confirm[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Help[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Options[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Previous_Level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Next_Level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Previous_Pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Next_Pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Toggle_Fullscreen[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Home[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_End[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Page_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Page_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:96:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Volume_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:97:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Volume_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:98:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Modifier[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Restore_Default_Controls[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:100:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Toggle_Designer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:101:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Scroll_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:102:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Scroll_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:103:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Primary_Click[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:104:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_System_Pointer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:105:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Disabled[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:106:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Enabled[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:107:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Pointer_Controls_Pad_Type[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:108:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Viewport[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Screen[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Sound[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Sfx_Volume[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:112:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Simulated_Pointer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Key[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Joy[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:116:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Ptr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:117:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Mod[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:118:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Skin[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:119:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_By[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:121:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Level_Author[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:122:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_endscreen_congrats[TXT_ENDSCREEN_CONGRATS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:124:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Volume[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:125:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Changes_saved[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:126:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Default_controls_restored[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:127:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_Press_something_and_release[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:128:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_No_input_was_detected[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:130:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_ptr_BtnLeft[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:131:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_ptr_BtnMiddle[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:132:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_ptr_BtnRight[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:133:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_ptr_WheelUp[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:134:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_ptr_WheelDown[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:136:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Backspace[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:137:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Tab[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:138:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Clear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:139:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Return[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:140:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Pause[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:141:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Escape[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:142:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Space[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:143:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Delete[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:144:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_KP[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:145:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:146:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:147:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:148:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:149:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Insert[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:150:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Home[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:151:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_End[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:152:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_PgUp[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:153:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_PgDn[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:154:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_NumLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:155:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_CapsLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:156:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_ScrlLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:157:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_RShift[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:158:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_LShift[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:159:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_RCtrl[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:160:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_LCtrl[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:161:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_RAlt[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:162:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_LAlt[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:163:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_RMeta[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:164:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_LMeta[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:165:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_LSuper[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:166:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_RSuper[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:167:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_AltGr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:168:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Compose[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:169:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Help[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:170:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_PrScr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:171:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_SysRq[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:172:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Break[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:173:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Menu[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:174:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Power[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:175:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Euro[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:176:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_key_Undo[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:178:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Ground[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:179:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Stop[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:180:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Radioactive_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:181:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Push_Box[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:182:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Capsule[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:183:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Bomb[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:184:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Bomb2[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:185:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Door[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:186:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Box[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:187:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Empty_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:188:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Butterfly[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:189:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Gun_Fire[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:190:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Force_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:191:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Screw[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:192:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Wall[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:193:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Black_Wall[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:194:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Teleport[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:195:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:196:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Magnet[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:197:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Bear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:198:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Black_Bear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:199:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Bird[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:200:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Key[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:201:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Bullets[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:202:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_on_map[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:203:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Laser_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:204:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Blaster_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:205:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Regular_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:206:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Fixed[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:207:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Moveable[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:208:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Rotating[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:209:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Moveable_Rotating[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:210:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Direction_right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:211:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Direction_down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:212:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Direction_left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:213:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Direction_up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:214:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Welcome_to_GNU_Robbo_Designer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:215:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Exit_designer_select_again_to_exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:216:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Reload_level_select_again_to_reload[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:217:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Level_reloaded[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:218:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_New_level_select_again_to_create[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:219:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Level_created[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:220:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Save_select_again_to_save_new_level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:221:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_New_level_appended_to_pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:222:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Clear_level_select_again_to_clear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:223:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Level_cleared[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:224:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Save_select_again_to_save_changes[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:225:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Changes_saved[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:226:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Level_resized_to[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:227:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char txt_konstruktor_Screws[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/gnurobbo-0.68+dfsg/locales.c:275:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	      if ((fp = fopen (filename, "r")) != NULL)
data/gnurobbo-0.68+dfsg/locales.c:359:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256], line[1024];	/* 1024 because if fgets returns a partial line then line_count will be incremented again */
data/gnurobbo-0.68+dfsg/locales.c:382:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/locales.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256], line[1024];
data/gnurobbo-0.68+dfsg/locales.c:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[60];
data/gnurobbo-0.68+dfsg/locales.c:519:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_intro_story]");
data/gnurobbo-0.68+dfsg/locales.c:523:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_intro_keys_PLATFORM_PC]");
data/gnurobbo-0.68+dfsg/locales.c:527:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_intro_keys_PLATFORM_GP2X]");
data/gnurobbo-0.68+dfsg/locales.c:531:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_intro_keys_PLATFORM_ZAURUS]");
data/gnurobbo-0.68+dfsg/locales.c:535:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_intro_keys_PLATFORM_FREMANTLE]");
data/gnurobbo-0.68+dfsg/locales.c:539:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_intro_keys_PLATFORM_PSP]");
data/gnurobbo-0.68+dfsg/locales.c:543:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_intro_keys_description]");
data/gnurobbo-0.68+dfsg/locales.c:546:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_intro_menu]");
data/gnurobbo-0.68+dfsg/locales.c:549:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_of]");
data/gnurobbo-0.68+dfsg/locales.c:551:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_intro_credits]");
data/gnurobbo-0.68+dfsg/locales.c:555:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_help_page0]");
data/gnurobbo-0.68+dfsg/locales.c:558:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_help_page1]");
data/gnurobbo-0.68+dfsg/locales.c:561:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_help_page2]");
data/gnurobbo-0.68+dfsg/locales.c:564:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_help_page3]");
data/gnurobbo-0.68+dfsg/locales.c:567:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Back]");
data/gnurobbo-0.68+dfsg/locales.c:569:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Next]");
data/gnurobbo-0.68+dfsg/locales.c:571:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Exit]");
data/gnurobbo-0.68+dfsg/locales.c:574:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_options_page1]");
data/gnurobbo-0.68+dfsg/locales.c:577:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Save]");
data/gnurobbo-0.68+dfsg/locales.c:579:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Game_Speed]");
data/gnurobbo-0.68+dfsg/locales.c:581:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Fast]");
data/gnurobbo-0.68+dfsg/locales.c:583:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Normal]");
data/gnurobbo-0.68+dfsg/locales.c:585:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Slow]");
data/gnurobbo-0.68+dfsg/locales.c:587:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Key_Repeat]");
data/gnurobbo-0.68+dfsg/locales.c:589:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Delay]");
data/gnurobbo-0.68+dfsg/locales.c:591:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Interval]");
data/gnurobbo-0.68+dfsg/locales.c:593:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Default_Joystick]");
data/gnurobbo-0.68+dfsg/locales.c:595:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_No_joystick_found]");
data/gnurobbo-0.68+dfsg/locales.c:597:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Joystick_Axes_Dead_Zone]");
data/gnurobbo-0.68+dfsg/locales.c:599:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Language]");
data/gnurobbo-0.68+dfsg/locales.c:601:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Translation_by]");
data/gnurobbo-0.68+dfsg/locales.c:603:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Save_Frequency]");
data/gnurobbo-0.68+dfsg/locales.c:605:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_On_Exit]");
data/gnurobbo-0.68+dfsg/locales.c:607:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_On_Change]");
data/gnurobbo-0.68+dfsg/locales.c:609:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Up]");
data/gnurobbo-0.68+dfsg/locales.c:611:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Up_Right]");
data/gnurobbo-0.68+dfsg/locales.c:613:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Right]");
data/gnurobbo-0.68+dfsg/locales.c:615:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Down_Right]");
data/gnurobbo-0.68+dfsg/locales.c:617:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Down]");
data/gnurobbo-0.68+dfsg/locales.c:619:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Down_Left]");
data/gnurobbo-0.68+dfsg/locales.c:621:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Left]");
data/gnurobbo-0.68+dfsg/locales.c:623:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Move_Up_Left]");
data/gnurobbo-0.68+dfsg/locales.c:625:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Shoot_Up]");
data/gnurobbo-0.68+dfsg/locales.c:627:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Shoot_Down]");
data/gnurobbo-0.68+dfsg/locales.c:629:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Shoot_Left]");
data/gnurobbo-0.68+dfsg/locales.c:631:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Shoot_Right]");
data/gnurobbo-0.68+dfsg/locales.c:633:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Restart]");
data/gnurobbo-0.68+dfsg/locales.c:635:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Confirm]");
data/gnurobbo-0.68+dfsg/locales.c:637:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Help]");
data/gnurobbo-0.68+dfsg/locales.c:639:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Options]");
data/gnurobbo-0.68+dfsg/locales.c:641:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Previous_Level]");
data/gnurobbo-0.68+dfsg/locales.c:643:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Next_Level]");
data/gnurobbo-0.68+dfsg/locales.c:645:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Previous_Pack]");
data/gnurobbo-0.68+dfsg/locales.c:647:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Next_Pack]");
data/gnurobbo-0.68+dfsg/locales.c:649:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Toggle_Fullscreen]");
data/gnurobbo-0.68+dfsg/locales.c:651:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Home]");
data/gnurobbo-0.68+dfsg/locales.c:653:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_End]");
data/gnurobbo-0.68+dfsg/locales.c:655:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Page_Up]");
data/gnurobbo-0.68+dfsg/locales.c:657:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Page_Down]");
data/gnurobbo-0.68+dfsg/locales.c:659:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Volume_Up]");
data/gnurobbo-0.68+dfsg/locales.c:661:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Volume_Down]");
data/gnurobbo-0.68+dfsg/locales.c:663:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Modifier]");
data/gnurobbo-0.68+dfsg/locales.c:665:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Restore_Default_Controls]");
data/gnurobbo-0.68+dfsg/locales.c:667:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Toggle_Designer]");
data/gnurobbo-0.68+dfsg/locales.c:669:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Scroll_Up]");
data/gnurobbo-0.68+dfsg/locales.c:671:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Scroll_Down]");
data/gnurobbo-0.68+dfsg/locales.c:673:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Primary_Click]");
data/gnurobbo-0.68+dfsg/locales.c:675:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_System_Pointer");
data/gnurobbo-0.68+dfsg/locales.c:677:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Disabled]");
data/gnurobbo-0.68+dfsg/locales.c:679:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Enabled]");
data/gnurobbo-0.68+dfsg/locales.c:681:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Pointer_Controls_Pad_Type]");
data/gnurobbo-0.68+dfsg/locales.c:683:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Viewport]");
data/gnurobbo-0.68+dfsg/locales.c:685:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Screen]");
data/gnurobbo-0.68+dfsg/locales.c:687:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Sound]");
data/gnurobbo-0.68+dfsg/locales.c:689:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Sfx_Volume]");
data/gnurobbo-0.68+dfsg/locales.c:691:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Simulated_Pointer]");
data/gnurobbo-0.68+dfsg/locales.c:694:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Key]");
data/gnurobbo-0.68+dfsg/locales.c:696:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Joy]");
data/gnurobbo-0.68+dfsg/locales.c:698:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Ptr]");
data/gnurobbo-0.68+dfsg/locales.c:700:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Mod]");
data/gnurobbo-0.68+dfsg/locales.c:702:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Skin]");
data/gnurobbo-0.68+dfsg/locales.c:704:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_By]");
data/gnurobbo-0.68+dfsg/locales.c:707:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Level_Author]");
data/gnurobbo-0.68+dfsg/locales.c:709:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_endscreen_congrats]");
data/gnurobbo-0.68+dfsg/locales.c:713:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Volume]");
data/gnurobbo-0.68+dfsg/locales.c:715:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Changes_saved]");
data/gnurobbo-0.68+dfsg/locales.c:717:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Default_controls_restored]");
data/gnurobbo-0.68+dfsg/locales.c:719:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_Press_something_and_release]");
data/gnurobbo-0.68+dfsg/locales.c:721:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_No_input_was_detected]");
data/gnurobbo-0.68+dfsg/locales.c:724:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_ptr_BtnLeft]");
data/gnurobbo-0.68+dfsg/locales.c:726:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_ptr_BtnMiddle]");
data/gnurobbo-0.68+dfsg/locales.c:728:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_ptr_BtnRight]");
data/gnurobbo-0.68+dfsg/locales.c:730:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_ptr_WheelUp]");
data/gnurobbo-0.68+dfsg/locales.c:732:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_ptr_WheelDown]");
data/gnurobbo-0.68+dfsg/locales.c:735:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Backspace]");
data/gnurobbo-0.68+dfsg/locales.c:737:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Tab]");
data/gnurobbo-0.68+dfsg/locales.c:739:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Clear]");
data/gnurobbo-0.68+dfsg/locales.c:741:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Return]");
data/gnurobbo-0.68+dfsg/locales.c:743:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Pause]");
data/gnurobbo-0.68+dfsg/locales.c:745:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Escape]");
data/gnurobbo-0.68+dfsg/locales.c:747:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Space]");
data/gnurobbo-0.68+dfsg/locales.c:749:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Delete]");
data/gnurobbo-0.68+dfsg/locales.c:751:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_KP]");
data/gnurobbo-0.68+dfsg/locales.c:753:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Up]");
data/gnurobbo-0.68+dfsg/locales.c:755:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Down]");
data/gnurobbo-0.68+dfsg/locales.c:757:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Right]");
data/gnurobbo-0.68+dfsg/locales.c:759:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Left]");
data/gnurobbo-0.68+dfsg/locales.c:761:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Insert]");
data/gnurobbo-0.68+dfsg/locales.c:763:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Home]");
data/gnurobbo-0.68+dfsg/locales.c:765:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_End]");
data/gnurobbo-0.68+dfsg/locales.c:767:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_PgUp]");
data/gnurobbo-0.68+dfsg/locales.c:769:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_PgDn]");
data/gnurobbo-0.68+dfsg/locales.c:771:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_NumLk]");
data/gnurobbo-0.68+dfsg/locales.c:773:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_CapsLk]");
data/gnurobbo-0.68+dfsg/locales.c:775:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_ScrlLk]");
data/gnurobbo-0.68+dfsg/locales.c:777:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_RShift]");
data/gnurobbo-0.68+dfsg/locales.c:779:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_LShift]");
data/gnurobbo-0.68+dfsg/locales.c:781:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_RCtrl]");
data/gnurobbo-0.68+dfsg/locales.c:783:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_LCtrl]");
data/gnurobbo-0.68+dfsg/locales.c:785:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_RAlt]");
data/gnurobbo-0.68+dfsg/locales.c:787:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_LAlt]");
data/gnurobbo-0.68+dfsg/locales.c:789:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_RMeta]");
data/gnurobbo-0.68+dfsg/locales.c:791:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_LMeta]");
data/gnurobbo-0.68+dfsg/locales.c:793:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_LSuper]");
data/gnurobbo-0.68+dfsg/locales.c:795:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_RSuper]");
data/gnurobbo-0.68+dfsg/locales.c:799:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_key_AltGr_PLATFORM_FREMANTLE]");
data/gnurobbo-0.68+dfsg/locales.c:802:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (config_items[++row].name, "[txt_key_AltGr]");
data/gnurobbo-0.68+dfsg/locales.c:806:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Compose]");
data/gnurobbo-0.68+dfsg/locales.c:808:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Help]");
data/gnurobbo-0.68+dfsg/locales.c:810:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_PrScr]");
data/gnurobbo-0.68+dfsg/locales.c:812:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_SysRq]");
data/gnurobbo-0.68+dfsg/locales.c:814:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Break]");
data/gnurobbo-0.68+dfsg/locales.c:816:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Menu]");
data/gnurobbo-0.68+dfsg/locales.c:818:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Power]");
data/gnurobbo-0.68+dfsg/locales.c:820:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Euro]");
data/gnurobbo-0.68+dfsg/locales.c:822:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_key_Undo]");
data/gnurobbo-0.68+dfsg/locales.c:825:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Ground]");
data/gnurobbo-0.68+dfsg/locales.c:827:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Stop]");
data/gnurobbo-0.68+dfsg/locales.c:829:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Radioactive_Field]");
data/gnurobbo-0.68+dfsg/locales.c:831:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Push_Box]");
data/gnurobbo-0.68+dfsg/locales.c:833:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Capsule]");
data/gnurobbo-0.68+dfsg/locales.c:835:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Bomb]");
data/gnurobbo-0.68+dfsg/locales.c:837:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Bomb2]");
data/gnurobbo-0.68+dfsg/locales.c:839:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Door]");
data/gnurobbo-0.68+dfsg/locales.c:841:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Box]");
data/gnurobbo-0.68+dfsg/locales.c:843:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Empty_Field]");
data/gnurobbo-0.68+dfsg/locales.c:845:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Butterfly]");
data/gnurobbo-0.68+dfsg/locales.c:847:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Gun_Fire]");
data/gnurobbo-0.68+dfsg/locales.c:849:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Force_Field]");
data/gnurobbo-0.68+dfsg/locales.c:851:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Screw]");
data/gnurobbo-0.68+dfsg/locales.c:853:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Wall]");
data/gnurobbo-0.68+dfsg/locales.c:855:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Black_Wall]");
data/gnurobbo-0.68+dfsg/locales.c:857:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Teleport]");
data/gnurobbo-0.68+dfsg/locales.c:859:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Gun]");
data/gnurobbo-0.68+dfsg/locales.c:861:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Magnet]");
data/gnurobbo-0.68+dfsg/locales.c:863:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Bear]");
data/gnurobbo-0.68+dfsg/locales.c:865:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Black_Bear]");
data/gnurobbo-0.68+dfsg/locales.c:867:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Bird]");
data/gnurobbo-0.68+dfsg/locales.c:869:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Key]");
data/gnurobbo-0.68+dfsg/locales.c:871:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Bullets]");
data/gnurobbo-0.68+dfsg/locales.c:873:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_on_map]");
data/gnurobbo-0.68+dfsg/locales.c:875:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Laser_Gun]");
data/gnurobbo-0.68+dfsg/locales.c:877:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Blaster_Gun]");
data/gnurobbo-0.68+dfsg/locales.c:879:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Regular_Gun]");
data/gnurobbo-0.68+dfsg/locales.c:881:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Fixed]");
data/gnurobbo-0.68+dfsg/locales.c:883:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Moveable]");
data/gnurobbo-0.68+dfsg/locales.c:885:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Rotating]");
data/gnurobbo-0.68+dfsg/locales.c:887:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Moveable_Rotating]");
data/gnurobbo-0.68+dfsg/locales.c:889:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Direction_right]");
data/gnurobbo-0.68+dfsg/locales.c:891:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Direction_down]");
data/gnurobbo-0.68+dfsg/locales.c:893:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Direction_left]");
data/gnurobbo-0.68+dfsg/locales.c:895:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Direction_up]");
data/gnurobbo-0.68+dfsg/locales.c:897:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Welcome_to_GNU_Robbo_Designer]");
data/gnurobbo-0.68+dfsg/locales.c:899:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Exit_designer_select_again_to_exit]");
data/gnurobbo-0.68+dfsg/locales.c:901:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Reload_level_select_again_to_reload]");
data/gnurobbo-0.68+dfsg/locales.c:903:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Level_reloaded]");
data/gnurobbo-0.68+dfsg/locales.c:905:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_New_level_select_again_to_create]");
data/gnurobbo-0.68+dfsg/locales.c:907:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Level_created]");
data/gnurobbo-0.68+dfsg/locales.c:909:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Save_select_again_to_save_new_level]");
data/gnurobbo-0.68+dfsg/locales.c:911:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_New_level_appended_to_pack]");
data/gnurobbo-0.68+dfsg/locales.c:913:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Clear_level_select_again_to_clear]");
data/gnurobbo-0.68+dfsg/locales.c:915:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Level_cleared]");
data/gnurobbo-0.68+dfsg/locales.c:917:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Save_select_again_to_save_changes]");
data/gnurobbo-0.68+dfsg/locales.c:919:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Changes_saved]");
data/gnurobbo-0.68+dfsg/locales.c:921:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (config_items[++row].name, "[txt_konstruktor_Level_resized_to]");
data/gnurobbo-0.68+dfsg/locales.c:923:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(config_items[++row].name, "[txt_konstruktor_screws]");
data/gnurobbo-0.68+dfsg/locales.c:952:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/locales.h:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_intro_story[TXT_INTRO_STORY_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_intro_keys[TXT_INTRO_KEYS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_intro_keys_description[TXT_INTRO_KEYS_DESCRIPTION_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_intro_menu[TXT_INTRO_MENU_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_of[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_intro_credits[TXT_INTRO_CREDITS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:46:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_help_page0[TXT_HELP_PAGE0_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_help_page1[TXT_HELP_PAGE1_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_help_page2[TXT_HELP_PAGE2_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_help_page3[TXT_HELP_PAGE3_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Back[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Next[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:52:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_options_page1[TXT_OPTIONS_PAGE1_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Save[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Game_Speed[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Fast[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Normal[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Slow[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:60:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Key_Repeat[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Delay[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:62:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Interval[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:63:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Default_Joystick[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:64:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_No_joystick_found[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Joystick_Axes_Dead_Zone[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:66:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Language[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:67:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Translation_by[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Save_Frequency[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:69:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_On_Exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_On_Change[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:71:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:72:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Up_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:73:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:74:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Down_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:75:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Down_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:77:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:78:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Move_Up_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:79:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Shoot_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Shoot_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Shoot_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Shoot_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Restart[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:84:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Confirm[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:85:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Help[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Options[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:87:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Previous_Level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:88:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Next_Level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:89:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Previous_Pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Next_Pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:91:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Toggle_Fullscreen[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:92:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Home[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_End[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:94:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Page_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Page_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Volume_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:97:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Volume_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:98:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Modifier[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:99:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Restore_Default_Controls[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Toggle_Designer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:101:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Scroll_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:102:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Scroll_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:103:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Primary_Click[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:104:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_System_Pointer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:105:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Disabled[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:106:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Enabled[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:107:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Pointer_Controls_Pad_Type[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:108:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Viewport[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:109:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Screen[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:110:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Sound[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:111:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Sfx_Volume[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Simulated_Pointer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:114:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Key[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:115:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Joy[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:116:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Ptr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:117:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Mod[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Skin[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_By[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:121:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Level_Author[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_endscreen_congrats[TXT_ENDSCREEN_CONGRATS_ROWS * TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:124:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Volume[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:125:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Changes_saved[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:126:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Default_controls_restored[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:127:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_Press_something_and_release[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:128:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_No_input_was_detected[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:130:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_ptr_BtnLeft[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:131:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_ptr_BtnMiddle[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:132:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_ptr_BtnRight[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:133:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_ptr_WheelUp[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:134:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_ptr_WheelDown[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:136:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Backspace[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:137:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Tab[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:138:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Clear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:139:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Return[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:140:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Pause[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:141:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Escape[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:142:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Space[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:143:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Delete[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:144:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_KP[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:145:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:146:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:147:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:148:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:149:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Insert[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:150:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Home[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:151:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_End[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:152:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_PgUp[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:153:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_PgDn[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:154:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_NumLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:155:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_CapsLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:156:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_ScrlLk[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:157:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_RShift[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:158:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_LShift[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:159:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_RCtrl[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:160:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_LCtrl[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_RAlt[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:162:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_LAlt[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:163:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_RMeta[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:164:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_LMeta[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:165:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_LSuper[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:166:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_RSuper[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:167:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_AltGr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:168:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Compose[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:169:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Help[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:170:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_PrScr[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:171:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_SysRq[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:172:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Break[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:173:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Menu[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:174:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Power[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:175:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Euro[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:176:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_key_Undo[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:178:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Ground[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:179:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Stop[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:180:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Radioactive_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:181:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Push_Box[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:182:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Capsule[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:183:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Bomb[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:184:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Bomb2[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:185:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Door[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:186:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Box[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:187:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Empty_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:188:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Butterfly[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:189:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Gun_Fire[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:190:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Force_Field[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Screw[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:192:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Wall[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:193:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Black_Wall[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:194:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Teleport[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:195:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:196:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Magnet[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:197:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Bear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:198:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Black_Bear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:199:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Bird[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:200:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Key[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:201:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Bullets[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:202:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_on_map[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:203:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Laser_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:204:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Blaster_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:205:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Regular_Gun[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:206:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Fixed[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:207:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Moveable[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:208:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Rotating[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:209:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Moveable_Rotating[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:210:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Direction_right[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:211:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Direction_down[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:212:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Direction_left[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:213:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Direction_up[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:214:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Welcome_to_GNU_Robbo_Designer[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:215:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Exit_designer_select_again_to_exit[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:216:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Reload_level_select_again_to_reload[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:217:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Level_reloaded[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:218:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_New_level_select_again_to_create[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:219:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Level_created[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:220:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Save_select_again_to_save_new_level[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:221:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_New_level_appended_to_pack[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:222:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Clear_level_select_again_to_clear[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:223:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Level_cleared[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:224:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Save_select_again_to_save_changes[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:225:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Changes_saved[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:226:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Level_resized_to[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:227:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char txt_konstruktor_Screws[TXT_MAX_COLS];
data/gnurobbo-0.68+dfsg/locales.h:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char foldername[100];		/* e.g. de_DE, en_GB, es_ES, pl_PL ... */
data/gnurobbo-0.68+dfsg/locales.h:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[60];				/* e.g. Deutsch, English, Español, Polski ... */
data/gnurobbo-0.68+dfsg/locales.h:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char author[60];			/* Enables translators to get recognition for their work */
data/gnurobbo-0.68+dfsg/rcfile.c:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char path_resource_file[100];
data/gnurobbo-0.68+dfsg/rcfile.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/gnurobbo-0.68+dfsg/rcfile.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char read_default_joystick_name[MAX_JOYSTICK_NAME_LENGTH];
data/gnurobbo-0.68+dfsg/rcfile.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char read_selected_skin[100], read_selected_locale[100];
data/gnurobbo-0.68+dfsg/rcfile.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_setting[50];
data/gnurobbo-0.68+dfsg/rcfile.c:71:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (read_default_joystick_name, "-1");
data/gnurobbo-0.68+dfsg/rcfile.c:72:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (read_selected_skin, "-1");
data/gnurobbo-0.68+dfsg/rcfile.c:73:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy (read_selected_locale, "-1");
data/gnurobbo-0.68+dfsg/rcfile.c:76:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/rcfile.c:85:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy (read_level_packs[count].filename, "-1");
data/gnurobbo-0.68+dfsg/rcfile.c:721:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (error_setting, "[filename]");
data/gnurobbo-0.68+dfsg/rcfile.c:726:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (error_setting, "[level_reached]");
data/gnurobbo-0.68+dfsg/rcfile.c:731:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (error_setting, "[level_selected]");
data/gnurobbo-0.68+dfsg/rcfile.c:736:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (error_setting, "[selected]");
data/gnurobbo-0.68+dfsg/rcfile.c:864:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (level_packs[level_pack_count].name, "-1");
data/gnurobbo-0.68+dfsg/rcfile.c:936:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen (filename, "w")) == NULL)
data/gnurobbo-0.68+dfsg/rcfile.h:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char path_resource_file[100];
data/gnurobbo-0.68+dfsg/screen.c:146:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *banner[8] = {
data/gnurobbo-0.68+dfsg/screen.c:157:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *helpscreenbanner[10] = {
data/gnurobbo-0.68+dfsg/screen.c:170:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *optionsscreenbanner[10] = {
data/gnurobbo-0.68+dfsg/screen.c:1539:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstring[256];
data/gnurobbo-0.68+dfsg/screen.c:1624:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tempstring, "%i", (robbo.screws / number) % 10);
data/gnurobbo-0.68+dfsg/screen.c:1655:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tempstring, "%i", (robbo.keys / number) % 10);
data/gnurobbo-0.68+dfsg/screen.c:1687:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tempstring, "%i", (robbo.bullets / number) % 10);
data/gnurobbo-0.68+dfsg/screen.c:1719:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf (tempstring, "%i",
data/gnurobbo-0.68+dfsg/screen.c:1967:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[256];
data/gnurobbo-0.68+dfsg/screen.c:2136:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (description, "software");
data/gnurobbo-0.68+dfsg/screen.c:2233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstring[60];
data/gnurobbo-0.68+dfsg/screen.c:2259:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tempstring, "%02X", debug_colour_select_r);
data/gnurobbo-0.68+dfsg/screen.c:2284:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tempstring, "%02X", debug_colour_select_g);
data/gnurobbo-0.68+dfsg/screen.c:2309:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf (tempstring, "%02X", debug_colour_select_b);
data/gnurobbo-0.68+dfsg/screen.c:2371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstring[256];
data/gnurobbo-0.68+dfsg/screen.c:2673:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (tempstring, "< ");
data/gnurobbo-0.68+dfsg/screen.c:2728:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (tempstring, " >");
data/gnurobbo-0.68+dfsg/screen.c:2761:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (tempstring, "< ");
data/gnurobbo-0.68+dfsg/screen.c:2815:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (tempstring, " >");
data/gnurobbo-0.68+dfsg/screen.c:2950:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstring[256];
data/gnurobbo-0.68+dfsg/screen.c:3682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempstring[256];
data/gnurobbo-0.68+dfsg/screen.c:4027:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%iHz", temp_game_cycle_limit);
data/gnurobbo-0.68+dfsg/screen.c:4101:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%i:", temp_default_joystick);
data/gnurobbo-0.68+dfsg/screen.c:4107:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%i:", temp_default_joystick);
data/gnurobbo-0.68+dfsg/screen.c:4112:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat (tempstring, "...");
data/gnurobbo-0.68+dfsg/screen.c:4188:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%i%%", temp_joystick_dead_zone);
data/gnurobbo-0.68+dfsg/screen.c:4260:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%ims", temp_key_repeat_delay);
data/gnurobbo-0.68+dfsg/screen.c:4318:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%ims", temp_key_repeat_interval);
data/gnurobbo-0.68+dfsg/screen.c:4765:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (tempstring, "%d", temp_sfx_vol);
data/gnurobbo-0.68+dfsg/screen.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];			/* A unique name */
data/gnurobbo-0.68+dfsg/screen.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[256];		/* A message on a single line */
data/gnurobbo-0.68+dfsg/skins.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/gnurobbo-0.68+dfsg/skins.c:125:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	      if ((fp = fopen (filename, "r")) != NULL)
data/gnurobbo-0.68+dfsg/skins.c:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256], line[1024];	/* 1024 because if fgets returns a partial line then line_count will be incremented again */
data/gnurobbo-0.68+dfsg/skins.c:210:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/skins.c:411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256], line[1024];	/* 1024 because if fgets returns a partial line then line_count will be incremented again */
data/gnurobbo-0.68+dfsg/skins.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[60];
data/gnurobbo-0.68+dfsg/skins.c:441:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[project_colours]");
data/gnurobbo-0.68+dfsg/skins.c:443:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[background]");
data/gnurobbo-0.68+dfsg/skins.c:445:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[version_text]");
data/gnurobbo-0.68+dfsg/skins.c:447:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[general_text]");
data/gnurobbo-0.68+dfsg/skins.c:449:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[menu_text]");
data/gnurobbo-0.68+dfsg/skins.c:451:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[menu_selected_text]");
data/gnurobbo-0.68+dfsg/skins.c:454:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[menu_selected_limit_text]");
data/gnurobbo-0.68+dfsg/skins.c:457:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[menu_greyed_text]");
data/gnurobbo-0.68+dfsg/skins.c:460:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[default_controls_text]");
data/gnurobbo-0.68+dfsg/skins.c:463:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[credits_text]");
data/gnurobbo-0.68+dfsg/skins.c:465:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[help_tile]");
data/gnurobbo-0.68+dfsg/skins.c:467:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[fade]");
data/gnurobbo-0.68+dfsg/skins.c:469:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[author_text]");
data/gnurobbo-0.68+dfsg/skins.c:471:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[designer_text]");
data/gnurobbo-0.68+dfsg/skins.c:473:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[designer_GAMEOBJ_tile]");
data/gnurobbo-0.68+dfsg/skins.c:475:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[designer_OBJS_tile]");
data/gnurobbo-0.68+dfsg/skins.c:477:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[designer_OBJV_tile]");
data/gnurobbo-0.68+dfsg/skins.c:479:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (config_items[++row].name, "[project_colours_end]");
data/gnurobbo-0.68+dfsg/skins.c:512:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/skins.c:694:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256], line[1024];	/* 1024 because if fgets returns a partial line then line_count will be incremented again */
data/gnurobbo-0.68+dfsg/skins.c:708:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen (filename, "r")) == NULL)
data/gnurobbo-0.68+dfsg/skins.c:913:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/skins.c:1171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/skins.c:1213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/skins.c:1332:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/gnurobbo-0.68+dfsg/skins.h:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char foldername[100];		/* e.g. tronic */
data/gnurobbo-0.68+dfsg/skins.h:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[60];		/* e.g. Tronic */
data/gnurobbo-0.68+dfsg/skins.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char author[60];
data/gnurobbo-0.68+dfsg/skins.h:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char about[3][60];		/* Up to 3 lines of text */
data/gnurobbo-0.68+dfsg/skins.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char soundskin[60];		/* file name of the sound skin */
data/gnurobbo-0.68+dfsg/sound.c:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            ammo_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            screw_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            bomb_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            box_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            door_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            gun_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            key_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            shoot_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:82:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            bird_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            teleport_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:84:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            walk_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:85:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            capsule_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            kill_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            magnet_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            exit_open_file[MAXFNAMELEN];
data/gnurobbo-0.68+dfsg/sound.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            tempstring[256];
data/gnurobbo-0.68+dfsg/sound.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            tempstring[256];
data/gnurobbo-0.68+dfsg/sound.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fname[1024];
data/gnurobbo-0.68+dfsg/sound.c:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            musicpath[1024];
data/gnurobbo-0.68+dfsg/sound.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            name[1024];
data/gnurobbo-0.68+dfsg/sound.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            line[1024];
data/gnurobbo-0.68+dfsg/sound.c:428:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = fopen(name, "r")) == NULL) {	/* no skin file, well,
data/gnurobbo-0.68+dfsg/sound.c:433:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = fopen(name, "r")) == NULL)	/* hmmm no default sound * 
data/gnurobbo-0.68+dfsg/sound.c:547:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fullpath[1024];
data/gnurobbo-0.68+dfsg/sound.h:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            fname[128];
data/gnurobbo-0.68+dfsg/tools/catutf8.c:36:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file1[50];
data/gnurobbo-0.68+dfsg/tools/catutf8.c:37:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file2[50];
data/gnurobbo-0.68+dfsg/tools/catutf8.c:53:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp1 = fopen (file1, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/fcp.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file1[50];
data/gnurobbo-0.68+dfsg/tools/fcp.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file2[50];
data/gnurobbo-0.68+dfsg/tools/fcp.c:56:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp1 = fopen (file1, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/fcp.c:60:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp2 = fopen (file2, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:40:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char author_string[256];
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char additional[2048];
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:120:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				level = atoi(argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:135:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp = fopen (filename, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[50];
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:240:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:247:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:253:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:259:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:265:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.10.%i\n", x, y, t0count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:272:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.1.%i\n", x, y, t1count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:279:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.2.%i\n", x, y, t2count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:286:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.3.%i\n", x, y, t3count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:293:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.4.%i\n", x, y, t4count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:300:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.5.%i\n", x, y, t5count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:307:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.6.%i\n", x, y, t6count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:314:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.7.%i\n", x, y, t7count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:321:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.8.%i\n", x, y, t8count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:328:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.9.%i\n", x, y, t9count);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:335:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.0.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:341:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:347:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:353:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:359:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:366:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:372:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:378:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:384:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:390:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:396:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:402:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:408:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:414:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:420:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:426:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:436:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:442:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:448:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:454:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:460:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:466:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:472:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:478:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:484:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:490:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:496:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:502:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:508:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.3.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvdump_millenium.c:515:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:38:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char author_string[256];
data/gnurobbo-0.68+dfsg/tools/lvldump.c:43:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char additional[4096];
data/gnurobbo-0.68+dfsg/tools/lvldump.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/tools/lvldump.c:118:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				level = atoi(argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:133:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp = fopen (filename, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/lvldump.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[50];
data/gnurobbo-0.68+dfsg/tools/lvldump.c:238:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:244:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:250:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.10.%i\n", x, y, t0count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:257:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.1.%i\n", x, y, t1count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:264:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.2.%i\n", x, y, t2count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:271:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.3.%i\n", x, y, t3count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:278:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.4.%i\n", x, y, t4count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:285:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.5.%i\n", x, y, t5count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:292:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.6.%i\n", x, y, t6count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:299:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.7.%i\n", x, y, t7count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:306:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.8.%i\n", x, y, t8count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:313:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.9.%i\n", x, y, t9count);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:321:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.0.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:327:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:333:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:339:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:348:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:354:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:360:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:366:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:372:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:378:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:384:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:390:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:396:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:402:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:408:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:414:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:422:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:428:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:434:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:440:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:446:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:452:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:458:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:464:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:470:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:476:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:482:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:488:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:495:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.3.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump.c:502:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:37:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char author_string[256];
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char additional[4096];
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:140:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				level = atoi(argv[++count]);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:151:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((fp = fopen (filename, "rb")) == NULL) {
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[50];
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:291:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:297:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.M.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:303:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.10.%i\n", x, y, t0count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:310:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.1.%i\n", x, y, t1count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:317:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.2.%i\n", x, y, t2count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:324:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.3.%i\n", x, y, t3count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:331:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.4.%i\n", x, y, t4count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:338:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.5.%i\n", x, y, t5count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:345:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.6.%i\n", x, y, t6count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:352:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.7.%i\n", x, y, t7count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:359:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.8.%i\n", x, y, t8count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:366:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.&.9.%i\n", x, y, t9count);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:374:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.0.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:380:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:386:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:392:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:401:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:407:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:413:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:419:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:425:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.3.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:431:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:437:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:443:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:449:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.2.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:455:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.1.0.1.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:461:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.0.0.0.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:467:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.}.2.0.0.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:475:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:481:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:487:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:493:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.@.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:499:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:505:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.3\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:511:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.2\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:517:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.*.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:523:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:529:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.1.1\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:535:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.2.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:541:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.0.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:548:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.3.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/tools/lvldump_rob.c:555:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(temp, "%i.%i.^.1.0.0\n", x, y);
data/gnurobbo-0.68+dfsg/win32/dirent.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		d_name[FILENAME_MAX]; /* File name. */
data/gnurobbo-0.68+dfsg/win32/dirent.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			dd_name[1];
data/gnurobbo-0.68+dfsg/win32/dirent.h:73:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		d_name[FILENAME_MAX]; /* File name. */
data/gnurobbo-0.68+dfsg/win32/dirent.h:102:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t			dd_name[1];
data/gnurobbo-0.68+dfsg/ROB_engine.c:504:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy (rob_last_error, "");
data/gnurobbo-0.68+dfsg/controls.c:1033:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy (joyname, SDL_JoystickName (joyid), MAX_JOYSTICK_NAME_LENGTH);
data/gnurobbo-0.68+dfsg/controls.c:1061:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy (joystick_list[count], "");
data/gnurobbo-0.68+dfsg/controls.c:1158:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "!");
data/gnurobbo-0.68+dfsg/controls.c:1161:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "\"");
data/gnurobbo-0.68+dfsg/controls.c:1164:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "#");
data/gnurobbo-0.68+dfsg/controls.c:1167:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "$");
data/gnurobbo-0.68+dfsg/controls.c:1170:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "&");
data/gnurobbo-0.68+dfsg/controls.c:1173:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "'");
data/gnurobbo-0.68+dfsg/controls.c:1176:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "(");
data/gnurobbo-0.68+dfsg/controls.c:1179:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ")");
data/gnurobbo-0.68+dfsg/controls.c:1182:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "*");
data/gnurobbo-0.68+dfsg/controls.c:1185:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "+");
data/gnurobbo-0.68+dfsg/controls.c:1188:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ",");
data/gnurobbo-0.68+dfsg/controls.c:1191:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "-");
data/gnurobbo-0.68+dfsg/controls.c:1194:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ".");
data/gnurobbo-0.68+dfsg/controls.c:1197:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "/");
data/gnurobbo-0.68+dfsg/controls.c:1200:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "0");
data/gnurobbo-0.68+dfsg/controls.c:1203:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "1");
data/gnurobbo-0.68+dfsg/controls.c:1206:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "2");
data/gnurobbo-0.68+dfsg/controls.c:1209:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "3");
data/gnurobbo-0.68+dfsg/controls.c:1212:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "4");
data/gnurobbo-0.68+dfsg/controls.c:1215:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "5");
data/gnurobbo-0.68+dfsg/controls.c:1218:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "6");
data/gnurobbo-0.68+dfsg/controls.c:1221:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "7");
data/gnurobbo-0.68+dfsg/controls.c:1224:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "8");
data/gnurobbo-0.68+dfsg/controls.c:1227:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "9");
data/gnurobbo-0.68+dfsg/controls.c:1230:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ":");
data/gnurobbo-0.68+dfsg/controls.c:1233:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ";");
data/gnurobbo-0.68+dfsg/controls.c:1236:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "<");
data/gnurobbo-0.68+dfsg/controls.c:1239:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "=");
data/gnurobbo-0.68+dfsg/controls.c:1242:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, ">");
data/gnurobbo-0.68+dfsg/controls.c:1245:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "?");
data/gnurobbo-0.68+dfsg/controls.c:1248:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "@");
data/gnurobbo-0.68+dfsg/controls.c:1251:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "[");
data/gnurobbo-0.68+dfsg/controls.c:1254:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "\\");
data/gnurobbo-0.68+dfsg/controls.c:1257:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "]");
data/gnurobbo-0.68+dfsg/controls.c:1260:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "^");
data/gnurobbo-0.68+dfsg/controls.c:1263:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "_");
data/gnurobbo-0.68+dfsg/controls.c:1266:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "`");
data/gnurobbo-0.68+dfsg/controls.c:1269:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "A");
data/gnurobbo-0.68+dfsg/controls.c:1272:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "B");
data/gnurobbo-0.68+dfsg/controls.c:1275:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "C");
data/gnurobbo-0.68+dfsg/controls.c:1278:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "D");
data/gnurobbo-0.68+dfsg/controls.c:1281:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "E");
data/gnurobbo-0.68+dfsg/controls.c:1284:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "F");
data/gnurobbo-0.68+dfsg/controls.c:1287:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "G");
data/gnurobbo-0.68+dfsg/controls.c:1290:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "H");
data/gnurobbo-0.68+dfsg/controls.c:1293:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "I");
data/gnurobbo-0.68+dfsg/controls.c:1296:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "J");
data/gnurobbo-0.68+dfsg/controls.c:1299:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "K");
data/gnurobbo-0.68+dfsg/controls.c:1302:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "L");
data/gnurobbo-0.68+dfsg/controls.c:1305:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "M");
data/gnurobbo-0.68+dfsg/controls.c:1308:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "N");
data/gnurobbo-0.68+dfsg/controls.c:1311:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "O");
data/gnurobbo-0.68+dfsg/controls.c:1314:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "P");
data/gnurobbo-0.68+dfsg/controls.c:1317:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "Q");
data/gnurobbo-0.68+dfsg/controls.c:1320:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "R");
data/gnurobbo-0.68+dfsg/controls.c:1323:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "S");
data/gnurobbo-0.68+dfsg/controls.c:1326:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "T");
data/gnurobbo-0.68+dfsg/controls.c:1329:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "U");
data/gnurobbo-0.68+dfsg/controls.c:1332:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "V");
data/gnurobbo-0.68+dfsg/controls.c:1335:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "W");
data/gnurobbo-0.68+dfsg/controls.c:1338:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "X");
data/gnurobbo-0.68+dfsg/controls.c:1341:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "Y");
data/gnurobbo-0.68+dfsg/controls.c:1344:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy (text, "Z");
data/gnurobbo-0.68+dfsg/controls.c:1555:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "A");
data/gnurobbo-0.68+dfsg/controls.c:1558:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "B");
data/gnurobbo-0.68+dfsg/controls.c:1561:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "C");
data/gnurobbo-0.68+dfsg/controls.c:1564:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "X");
data/gnurobbo-0.68+dfsg/controls.c:1567:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "Y");
data/gnurobbo-0.68+dfsg/controls.c:1570:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "Z");
data/gnurobbo-0.68+dfsg/controls.c:1604:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "1");
data/gnurobbo-0.68+dfsg/controls.c:1607:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "2");
data/gnurobbo-0.68+dfsg/controls.c:1610:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "3");
data/gnurobbo-0.68+dfsg/controls.c:1613:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "4");
data/gnurobbo-0.68+dfsg/controls.c:1616:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "5");
data/gnurobbo-0.68+dfsg/controls.c:1619:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "6");
data/gnurobbo-0.68+dfsg/controls.c:1622:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "7");
data/gnurobbo-0.68+dfsg/controls.c:1625:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "8");
data/gnurobbo-0.68+dfsg/controls.c:1628:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "9");
data/gnurobbo-0.68+dfsg/controls.c:1697:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "A");
data/gnurobbo-0.68+dfsg/controls.c:1700:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "B");
data/gnurobbo-0.68+dfsg/controls.c:1703:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "X");
data/gnurobbo-0.68+dfsg/controls.c:1706:6:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
					strcpy (text, "Y");
data/gnurobbo-0.68+dfsg/game.c:377:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat (path_resource_file, "/");
data/gnurobbo-0.68+dfsg/game.c:382:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat (path_resource_file, "/");
data/gnurobbo-0.68+dfsg/levels.c:367:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
							strcat (level_packs[level_pack_count].filename,
data/gnurobbo-0.68+dfsg/levels.c:430:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					for (count2 = strlen (line) - 1; count2 >= 0; count2--)
data/gnurobbo-0.68+dfsg/levels.c:433:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy (level_packs[count].name, line, 20);
data/gnurobbo-0.68+dfsg/levels.c:621:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (count = strlen (line) - 1; count >= 0; count--)
data/gnurobbo-0.68+dfsg/levels.c:751:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(level.notes) < 1024 - 3)
data/gnurobbo-0.68+dfsg/levels.c:754:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					count = 1024 - 3 - strlen(level.notes);
data/gnurobbo-0.68+dfsg/levels.c:755:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(line) <= count)
data/gnurobbo-0.68+dfsg/levels.c:761:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
						strncat (level.notes, line, count);
data/gnurobbo-0.68+dfsg/levels.c:767:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
					strcat (level.notes, "\n");
data/gnurobbo-0.68+dfsg/levels.c:869:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy (level.author, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/locales.c:273:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	      strcat (filename, "/");
data/gnurobbo-0.68+dfsg/locales.c:283:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		      strncpy (locales[locale_count].foldername,
data/gnurobbo-0.68+dfsg/locales.c:380:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (filename, "/");
data/gnurobbo-0.68+dfsg/locales.c:396:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      for (count2 = strlen (line) - 1; count2 >= 0; count2--)
data/gnurobbo-0.68+dfsg/locales.c:430:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/locales.c:432:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (locales[count].name, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/locales.c:442:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/locales.c:444:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (locales[count].author, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/locales.c:950:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (filename, "/");
data/gnurobbo-0.68+dfsg/locales.c:964:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for (count2 = strlen (line) - 1; count2 >= 0; count2--)
data/gnurobbo-0.68+dfsg/locales.c:972:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen (config_items[tag_index].name)))
data/gnurobbo-0.68+dfsg/locales.c:1002:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if (strlen (line) > 0)
data/gnurobbo-0.68+dfsg/locales.c:1005:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
							strncpy (&(config_items[count].destination)
data/gnurobbo-0.68+dfsg/locales.c:1065:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (envlang != NULL) length = strlen(envlang);
data/gnurobbo-0.68+dfsg/rcfile.c:153:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for (count = strlen (read_default_joystick_name) - 1; count >= 0; count--)
data/gnurobbo-0.68+dfsg/screen.c:1751:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (count = 0; count < strlen (level_packs[selected_pack].name);
data/gnurobbo-0.68+dfsg/screen.c:1774:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if (strlen (level.author) > 0)
data/gnurobbo-0.68+dfsg/screen.c:1780:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	  strcpy (tempstring, "");
data/gnurobbo-0.68+dfsg/screen.c:1782:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (tempstring) > 0)
data/gnurobbo-0.68+dfsg/screen.c:4098:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			else if (strlen (joystick_list[temp_default_joystick]) <=
data/gnurobbo-0.68+dfsg/screen.c:4108:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat (tempstring,
data/gnurobbo-0.68+dfsg/screen.c:5292:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (the_box.message) == 0)
data/gnurobbo-0.68+dfsg/screen.c:5293:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy (the_box.message, " ");	/* This stops SDL_ttf from seg faulting on NULL strings >( */
data/gnurobbo-0.68+dfsg/skins.c:123:8:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	      strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:137:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		      strncpy (skins[skin_count].foldername,
data/gnurobbo-0.68+dfsg/skins.c:208:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:228:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      for (count2 = strlen (line) - 1; count2 >= 0; count2--)
data/gnurobbo-0.68+dfsg/skins.c:310:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/skins.c:312:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (skins[count].name, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/skins.c:322:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/skins.c:324:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (skins[count].author, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/skins.c:335:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/skins.c:337:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (skins[count].about[row], line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/skins.c:348:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      if (strlen (line) != 0)
data/gnurobbo-0.68+dfsg/skins.c:350:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			  strncpy (skins[count].soundskin, line, 60);	/* Prevent overruns */
data/gnurobbo-0.68+dfsg/skins.c:510:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:523:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  for (count2 = strlen (line) - 1; count2 >= 0; count2--)
data/gnurobbo-0.68+dfsg/skins.c:532:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   strlen (config_items[tag_index].name)))
data/gnurobbo-0.68+dfsg/skins.c:706:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:730:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (count = strlen (line) - 1; count >= 0; count--)
data/gnurobbo-0.68+dfsg/skins.c:943:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:1175:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:1218:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat (filename, "/");
data/gnurobbo-0.68+dfsg/skins.c:1337:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat (filename, "/");
data/gnurobbo-0.68+dfsg/sound.c:382:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(playlist[song_count].fname, dentry->d_name, 128);
data/gnurobbo-0.68+dfsg/sound.c:441:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (c = strlen(line) - 1; c >= 0; c--)	/* fgets will get [CR]LFs
data/gnurobbo-0.68+dfsg/sound.c:454:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (!strncmp(sounds[c].rctag, line, strlen(sounds[c].rctag))) {	/* we 
data/gnurobbo-0.68+dfsg/sound.c:476:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(sounds[c].fname, line, MAXFNAMELEN);

ANALYSIS SUMMARY:

Hits = 1566
Lines analyzed = 26904 in approximately 0.97 seconds (27734 lines/second)
Physical Source Lines of Code (SLOC) = 21440
Hits@level = [0] 1085 [1] 145 [2] 923 [3]  11 [4] 487 [5]   0
Hits@level+ = [0+] 2651 [1+] 1566 [2+] 1421 [3+] 498 [4+] 487 [5+]   0
Hits/KSLOC@level+ = [0+] 123.647 [1+] 73.041 [2+] 66.278 [3+] 23.2276 [4+] 22.7146 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.