Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/graywolf-0.1.6/include/yalecad/assign.h
Examining data/graywolf-0.1.6/include/yalecad/base.h
Examining data/graywolf-0.1.6/include/yalecad/bitset.h
Examining data/graywolf-0.1.6/include/yalecad/buster.h
Examining data/graywolf-0.1.6/include/yalecad/cleanup.h
Examining data/graywolf-0.1.6/include/yalecad/colors.h
Examining data/graywolf-0.1.6/include/yalecad/dbinary.h
Examining data/graywolf-0.1.6/include/yalecad/debug.h
Examining data/graywolf-0.1.6/include/yalecad/deck.h
Examining data/graywolf-0.1.6/include/yalecad/dialog.h
Examining data/graywolf-0.1.6/include/yalecad/draw.h
Examining data/graywolf-0.1.6/include/yalecad/dset.h
Examining data/graywolf-0.1.6/include/yalecad/edcolors.h
Examining data/graywolf-0.1.6/include/yalecad/file.h
Examining data/graywolf-0.1.6/include/yalecad/graph.h
Examining data/graywolf-0.1.6/include/yalecad/hash.h
Examining data/graywolf-0.1.6/include/yalecad/heap.h
Examining data/graywolf-0.1.6/include/yalecad/linalg.h
Examining data/graywolf-0.1.6/include/yalecad/list.h
Examining data/graywolf-0.1.6/include/yalecad/mac.h
Examining data/graywolf-0.1.6/include/yalecad/menus.h
Examining data/graywolf-0.1.6/include/yalecad/message.h
Examining data/graywolf-0.1.6/include/yalecad/okmalloc.h
Examining data/graywolf-0.1.6/include/yalecad/plot.h
Examining data/graywolf-0.1.6/include/yalecad/program.h
Examining data/graywolf-0.1.6/include/yalecad/project.h
Examining data/graywolf-0.1.6/include/yalecad/queue.h
Examining data/graywolf-0.1.6/include/yalecad/quicksort.h
Examining data/graywolf-0.1.6/include/yalecad/radixsort.h
Examining data/graywolf-0.1.6/include/yalecad/rand.h
Examining data/graywolf-0.1.6/include/yalecad/rbtree.h
Examining data/graywolf-0.1.6/include/yalecad/relpos.h
Examining data/graywolf-0.1.6/include/yalecad/set.h
Examining data/graywolf-0.1.6/include/yalecad/stack.h
Examining data/graywolf-0.1.6/include/yalecad/stat.h
Examining data/graywolf-0.1.6/include/yalecad/string.h
Examining data/graywolf-0.1.6/include/yalecad/system.h
Examining data/graywolf-0.1.6/include/yalecad/tech.h
Examining data/graywolf-0.1.6/include/yalecad/time.h
Examining data/graywolf-0.1.6/include/yalecad/timer.h
Examining data/graywolf-0.1.6/include/yalecad/tree.h
Examining data/graywolf-0.1.6/include/yalecad/wgraphics.h
Examining data/graywolf-0.1.6/include/yalecad/yreadpar.h
Examining data/graywolf-0.1.6/src/Ylib/assign.c
Examining data/graywolf-0.1.6/src/Ylib/buster.c
Examining data/graywolf-0.1.6/src/Ylib/cleanup.c
Examining data/graywolf-0.1.6/src/Ylib/colors.c
Examining data/graywolf-0.1.6/src/Ylib/deck.c
Examining data/graywolf-0.1.6/src/Ylib/dialog.c
Examining data/graywolf-0.1.6/src/Ylib/draw.c
Examining data/graywolf-0.1.6/src/Ylib/dset.c
Examining data/graywolf-0.1.6/src/Ylib/edcolors.c
Examining data/graywolf-0.1.6/src/Ylib/file.c
Examining data/graywolf-0.1.6/src/Ylib/getftime.c
Examining data/graywolf-0.1.6/src/Ylib/graph.c
Examining data/graywolf-0.1.6/src/Ylib/grid.c
Examining data/graywolf-0.1.6/src/Ylib/hash.c
Examining data/graywolf-0.1.6/src/Ylib/heap.c
Examining data/graywolf-0.1.6/src/Ylib/info.h
Examining data/graywolf-0.1.6/src/Ylib/list.c
Examining data/graywolf-0.1.6/src/Ylib/log.c
Examining data/graywolf-0.1.6/src/Ylib/menus.c
Examining data/graywolf-0.1.6/src/Ylib/message.c
Examining data/graywolf-0.1.6/src/Ylib/mst.c
Examining data/graywolf-0.1.6/src/Ylib/mytime.c
Examining data/graywolf-0.1.6/src/Ylib/okmalloc.c
Examining data/graywolf-0.1.6/src/Ylib/path.c
Examining data/graywolf-0.1.6/src/Ylib/plot.c
Examining data/graywolf-0.1.6/src/Ylib/program.c
Examining data/graywolf-0.1.6/src/Ylib/project.c
Examining data/graywolf-0.1.6/src/Ylib/queue.c
Examining data/graywolf-0.1.6/src/Ylib/quicksort.c
Examining data/graywolf-0.1.6/src/Ylib/radixsort.c
Examining data/graywolf-0.1.6/src/Ylib/rand.c
Examining data/graywolf-0.1.6/src/Ylib/rbtree.c
Examining data/graywolf-0.1.6/src/Ylib/relpath.c
Examining data/graywolf-0.1.6/src/Ylib/set.c
Examining data/graywolf-0.1.6/src/Ylib/stat.c
Examining data/graywolf-0.1.6/src/Ylib/stats.c
Examining data/graywolf-0.1.6/src/Ylib/string.c
Examining data/graywolf-0.1.6/src/Ylib/system.c
Examining data/graywolf-0.1.6/src/Ylib/time.c
Examining data/graywolf-0.1.6/src/Ylib/timer.c
Examining data/graywolf-0.1.6/src/Ylib/trans.c
Examining data/graywolf-0.1.6/src/Ylib/wgraphics.c
Examining data/graywolf-0.1.6/src/Ylib/ydebug.c
Examining data/graywolf-0.1.6/src/Ylib/yreadpar.c
Examining data/graywolf-0.1.6/src/date/date.c
Examining data/graywolf-0.1.6/src/date/getdate.c
Examining data/graywolf-0.1.6/src/genrows/date.h
Examining data/graywolf-0.1.6/src/genrows/dialog.h
Examining data/graywolf-0.1.6/src/genrows/dialog2.h
Examining data/graywolf-0.1.6/src/genrows/dialog3.h
Examining data/graywolf-0.1.6/src/genrows/draw.c
Examining data/graywolf-0.1.6/src/genrows/genrows.c
Examining data/graywolf-0.1.6/src/genrows/genrows.h
Examining data/graywolf-0.1.6/src/genrows/globals.h
Examining data/graywolf-0.1.6/src/genrows/main.c
Examining data/graywolf-0.1.6/src/genrows/menus.h
Examining data/graywolf-0.1.6/src/genrows/merge.c
Examining data/graywolf-0.1.6/src/genrows/readpar.c
Examining data/graywolf-0.1.6/src/genrows/readpar.h
Examining data/graywolf-0.1.6/src/mc_compact/cdraw.c
Examining data/graywolf-0.1.6/src/mc_compact/changraph.c
Examining data/graywolf-0.1.6/src/mc_compact/cmain.c
Examining data/graywolf-0.1.6/src/mc_compact/compact.h
Examining data/graywolf-0.1.6/src/mc_compact/compactor.c
Examining data/graywolf-0.1.6/src/mc_compact/date.h
Examining data/graywolf-0.1.6/src/mc_compact/debug2.c
Examining data/graywolf-0.1.6/src/mc_compact/grid.c
Examining data/graywolf-0.1.6/src/mc_compact/io.c
Examining data/graywolf-0.1.6/src/mc_compact/menus.h
Examining data/graywolf-0.1.6/src/mc_compact/movestrat.c
Examining data/graywolf-0.1.6/src/mc_compact/movestrat2.c
Examining data/graywolf-0.1.6/src/mc_compact/multi.c
Examining data/graywolf-0.1.6/src/mc_compact/readcgraph.h
Examining data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h
Examining data/graywolf-0.1.6/src/mc_compact/readtiles.c
Examining data/graywolf-0.1.6/src/mc_compact/readtiles_l.h
Examining data/graywolf-0.1.6/src/mc_compact/stdmacro.c
Examining data/graywolf-0.1.6/src/mc_compact/xcompact.c
Examining data/graywolf-0.1.6/src/mc_compact/ycompact.c
Examining data/graywolf-0.1.6/src/mc_compact/readcgraph.c
Examining data/graywolf-0.1.6/src/mincut/date.h
Examining data/graywolf-0.1.6/src/mincut/globals.h
Examining data/graywolf-0.1.6/src/mincut/main.c
Examining data/graywolf-0.1.6/src/mincut/output.c
Examining data/graywolf-0.1.6/src/mincut/output.h
Examining data/graywolf-0.1.6/src/mincut/readcells.c
Examining data/graywolf-0.1.6/src/mincut/readcells_l.h
Examining data/graywolf-0.1.6/src/syntax/date.h
Examining data/graywolf-0.1.6/src/syntax/globals.h
Examining data/graywolf-0.1.6/src/syntax/main.c
Examining data/graywolf-0.1.6/src/syntax/output.c
Examining data/graywolf-0.1.6/src/syntax/readcells.c
Examining data/graywolf-0.1.6/src/syntax/readcells_l.h
Examining data/graywolf-0.1.6/src/twflow/autoflow.c
Examining data/graywolf-0.1.6/src/twflow/date.h
Examining data/graywolf-0.1.6/src/twflow/findflow.c
Examining data/graywolf-0.1.6/src/twflow/globals.h
Examining data/graywolf-0.1.6/src/twflow/graphics.c
Examining data/graywolf-0.1.6/src/twflow/io.c
Examining data/graywolf-0.1.6/src/twflow/io.h
Examining data/graywolf-0.1.6/src/twflow/main.c
Examining data/graywolf-0.1.6/src/twflow/menus.h
Examining data/graywolf-0.1.6/src/twflow/program.c
Examining data/graywolf-0.1.6/src/twflow/readobjects.c
Examining data/graywolf-0.1.6/src/twflow/readobjects_l.h
Examining data/graywolf-0.1.6/src/twmc/acceptt.c
Examining data/graywolf-0.1.6/src/twmc/analog.h
Examining data/graywolf-0.1.6/src/twmc/analyze.c
Examining data/graywolf-0.1.6/src/twmc/compact.c
Examining data/graywolf-0.1.6/src/twmc/config1.c
Examining data/graywolf-0.1.6/src/twmc/config2.c
Examining data/graywolf-0.1.6/src/twmc/configpads.c
Examining data/graywolf-0.1.6/src/twmc/configpads.h
Examining data/graywolf-0.1.6/src/twmc/custom.h
Examining data/graywolf-0.1.6/src/twmc/date.h
Examining data/graywolf-0.1.6/src/twmc/debug.c
Examining data/graywolf-0.1.6/src/twmc/dens.h
Examining data/graywolf-0.1.6/src/twmc/dialog.h
Examining data/graywolf-0.1.6/src/twmc/finalout.c
Examining data/graywolf-0.1.6/src/twmc/finalpin.c
Examining data/graywolf-0.1.6/src/twmc/findcheck.c
Examining data/graywolf-0.1.6/src/twmc/findcost.c
Examining data/graywolf-0.1.6/src/twmc/findloc.c
Examining data/graywolf-0.1.6/src/twmc/findside.c
Examining data/graywolf-0.1.6/src/twmc/findside.h
Examining data/graywolf-0.1.6/src/twmc/fixcell.c
Examining data/graywolf-0.1.6/src/twmc/genorient.c
Examining data/graywolf-0.1.6/src/twmc/gmain.c
Examining data/graywolf-0.1.6/src/twmc/graphics.c
Examining data/graywolf-0.1.6/src/twmc/initialize.c
Examining data/graywolf-0.1.6/src/twmc/initialize.h
Examining data/graywolf-0.1.6/src/twmc/initnets.c
Examining data/graywolf-0.1.6/src/twmc/initnets.h
Examining data/graywolf-0.1.6/src/twmc/loadbins.c
Examining data/graywolf-0.1.6/src/twmc/main.c
Examining data/graywolf-0.1.6/src/twmc/main.h
Examining data/graywolf-0.1.6/src/twmc/makebins.c
Examining data/graywolf-0.1.6/src/twmc/makesite.c
Examining data/graywolf-0.1.6/src/twmc/menus.h
Examining data/graywolf-0.1.6/src/twmc/mergecell.c
Examining data/graywolf-0.1.6/src/twmc/neworient.c
Examining data/graywolf-0.1.6/src/twmc/neworient.h
Examining data/graywolf-0.1.6/src/twmc/newtemp.c
Examining data/graywolf-0.1.6/src/twmc/outgeo.c
Examining data/graywolf-0.1.6/src/twmc/outpin.c
Examining data/graywolf-0.1.6/src/twmc/output.c
Examining data/graywolf-0.1.6/src/twmc/overlap.c
Examining data/graywolf-0.1.6/src/twmc/pads.h
Examining data/graywolf-0.1.6/src/twmc/partition.c
Examining data/graywolf-0.1.6/src/twmc/partition.h
Examining data/graywolf-0.1.6/src/twmc/paths.c
Examining data/graywolf-0.1.6/src/twmc/penalties.c
Examining data/graywolf-0.1.6/src/twmc/perimeter.c
Examining data/graywolf-0.1.6/src/twmc/placepads.c
Examining data/graywolf-0.1.6/src/twmc/placepin.c
Examining data/graywolf-0.1.6/src/twmc/prboard.c
Examining data/graywolf-0.1.6/src/twmc/readcells.h
Examining data/graywolf-0.1.6/src/twmc/readcells_l.h
Examining data/graywolf-0.1.6/src/twmc/readnets.c
Examining data/graywolf-0.1.6/src/twmc/readnets.h
Examining data/graywolf-0.1.6/src/twmc/readnets_l.h
Examining data/graywolf-0.1.6/src/twmc/readpar.c
Examining data/graywolf-0.1.6/src/twmc/readpar.h
Examining data/graywolf-0.1.6/src/twmc/reconfig.c
Examining data/graywolf-0.1.6/src/twmc/rmain.c
Examining data/graywolf-0.1.6/src/twmc/savewolf.c
Examining data/graywolf-0.1.6/src/twmc/scrapnet.c
Examining data/graywolf-0.1.6/src/twmc/selectpin.c
Examining data/graywolf-0.1.6/src/twmc/setpwates.c
Examining data/graywolf-0.1.6/src/twmc/sortpad.c
Examining data/graywolf-0.1.6/src/twmc/sortpin.c
Examining data/graywolf-0.1.6/src/twmc/temp.h
Examining data/graywolf-0.1.6/src/twmc/tidialog.h
Examining data/graywolf-0.1.6/src/twmc/twstats.c
Examining data/graywolf-0.1.6/src/twmc/uaspect.c
Examining data/graywolf-0.1.6/src/twmc/uinst.c
Examining data/graywolf-0.1.6/src/twmc/uloop.c
Examining data/graywolf-0.1.6/src/twmc/unbust.c
Examining data/graywolf-0.1.6/src/twmc/unet.c
Examining data/graywolf-0.1.6/src/twmc/upin.c
Examining data/graywolf-0.1.6/src/twmc/upinswap.c
Examining data/graywolf-0.1.6/src/twmc/usite1.c
Examining data/graywolf-0.1.6/src/twmc/usite2.c
Examining data/graywolf-0.1.6/src/twmc/usoftmove.c
Examining data/graywolf-0.1.6/src/twmc/utemp.c
Examining data/graywolf-0.1.6/src/twmc/watesides.c
Examining data/graywolf-0.1.6/src/twmc/window.c
Examining data/graywolf-0.1.6/src/twmc/wirecosts.c
Examining data/graywolf-0.1.6/src/twmc/wireest.c
Examining data/graywolf-0.1.6/src/twmc/wireratio.c
Examining data/graywolf-0.1.6/src/twmc/readcells.c
Examining data/graywolf-0.1.6/src/twsc/acceptt.c
Examining data/graywolf-0.1.6/src/twsc/buildimp.c
Examining data/graywolf-0.1.6/src/twsc/cell_width.c
Examining data/graywolf-0.1.6/src/twsc/cglbroute.c
Examining data/graywolf-0.1.6/src/twsc/changrid.c
Examining data/graywolf-0.1.6/src/twsc/coarseglb.c
Examining data/graywolf-0.1.6/src/twsc/configpads.c
Examining data/graywolf-0.1.6/src/twsc/configure.c
Examining data/graywolf-0.1.6/src/twsc/countf.c
Examining data/graywolf-0.1.6/src/twsc/crossbus.c
Examining data/graywolf-0.1.6/src/twsc/date.h
Examining data/graywolf-0.1.6/src/twsc/debug.c
Examining data/graywolf-0.1.6/src/twsc/debug2.c
Examining data/graywolf-0.1.6/src/twsc/dimbox.c
Examining data/graywolf-0.1.6/src/twsc/feedest.c
Examining data/graywolf-0.1.6/src/twsc/findcost.c
Examining data/graywolf-0.1.6/src/twsc/findcostf.c
Examining data/graywolf-0.1.6/src/twsc/findrcost.c
Examining data/graywolf-0.1.6/src/twsc/findunlap.c
Examining data/graywolf-0.1.6/src/twsc/gateswap.c
Examining data/graywolf-0.1.6/src/twsc/globe.c
Examining data/graywolf-0.1.6/src/twsc/globroute.c
Examining data/graywolf-0.1.6/src/twsc/graphics.c
Examining data/graywolf-0.1.6/src/twsc/menus.h
Examining data/graywolf-0.1.6/src/twsc/mergeseg.c
Examining data/graywolf-0.1.6/src/twsc/netgraph.c
Examining data/graywolf-0.1.6/src/twsc/newtemp.c
Examining data/graywolf-0.1.6/src/twsc/outcm.c
Examining data/graywolf-0.1.6/src/twsc/outpins.c
Examining data/graywolf-0.1.6/src/twsc/outpins1.c
Examining data/graywolf-0.1.6/src/twsc/output.c
Examining data/graywolf-0.1.6/src/twsc/overlap.c
Examining data/graywolf-0.1.6/src/twsc/pads.h
Examining data/graywolf-0.1.6/src/twsc/paths.c
Examining data/graywolf-0.1.6/src/twsc/placepads.c
Examining data/graywolf-0.1.6/src/twsc/readblck.c
Examining data/graywolf-0.1.6/src/twsc/readblck.h
Examining data/graywolf-0.1.6/src/twsc/readcell.h
Examining data/graywolf-0.1.6/src/twsc/readcell_l.h
Examining data/graywolf-0.1.6/src/twsc/readnets.c
Examining data/graywolf-0.1.6/src/twsc/readnets.h
Examining data/graywolf-0.1.6/src/twsc/readnets_l.h
Examining data/graywolf-0.1.6/src/twsc/readpar.c
Examining data/graywolf-0.1.6/src/twsc/readpar.h
Examining data/graywolf-0.1.6/src/twsc/reconfig.c
Examining data/graywolf-0.1.6/src/twsc/rmoverlap.c
Examining data/graywolf-0.1.6/src/twsc/rowevener.c
Examining data/graywolf-0.1.6/src/twsc/savewolf.c
Examining data/graywolf-0.1.6/src/twsc/seagate.c
Examining data/graywolf-0.1.6/src/twsc/sort.c
Examining data/graywolf-0.1.6/src/twsc/sortpad.c
Examining data/graywolf-0.1.6/src/twsc/sortpin.c
Examining data/graywolf-0.1.6/src/twsc/steiner.c
Examining data/graywolf-0.1.6/src/twsc/uc0.c
Examining data/graywolf-0.1.6/src/twsc/ucxx1.c
Examining data/graywolf-0.1.6/src/twsc/ucxx2.c
Examining data/graywolf-0.1.6/src/twsc/ucxxglb.h
Examining data/graywolf-0.1.6/src/twsc/ucxxo1.c
Examining data/graywolf-0.1.6/src/twsc/ucxxo2.c
Examining data/graywolf-0.1.6/src/twsc/ucxxp.c
Examining data/graywolf-0.1.6/src/twsc/uloop.c
Examining data/graywolf-0.1.6/src/twsc/unlap.c
Examining data/graywolf-0.1.6/src/twsc/upair.c
Examining data/graywolf-0.1.6/src/twsc/urcost.c
Examining data/graywolf-0.1.6/src/twsc/utemp.c
Examining data/graywolf-0.1.6/src/twsc/xpickint.c
Examining data/graywolf-0.1.6/src/twsc/config.h
Examining data/graywolf-0.1.6/src/twsc/feeds.h
Examining data/graywolf-0.1.6/src/twsc/groute.h
Examining data/graywolf-0.1.6/src/twsc/main.c
Examining data/graywolf-0.1.6/src/twsc/main.h
Examining data/graywolf-0.1.6/src/twsc/parser.c
Examining data/graywolf-0.1.6/src/twsc/parser.h
Examining data/graywolf-0.1.6/src/twsc/readcell.c
Examining data/graywolf-0.1.6/src/twsc/standard.h

FINAL RESULTS:

data/graywolf-0.1.6/src/Ylib/file.c:122:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    len = readlink( pathname, buf, BUFSIZ ) ;
data/graywolf-0.1.6/include/yalecad/debug.h:47:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:51:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:60:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:64:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:74:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:78:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:89:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:93:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:102:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:106:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:118:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:122:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:133:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	    sprintf( assertMsg_xz,\
data/graywolf-0.1.6/include/yalecad/debug.h:137:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( assertMsg_xz, "%s\n", userMsg_xz ) ;\
data/graywolf-0.1.6/include/yalecad/debug.h:140:6:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    scanf( "%s", assertMsg_xz );\
data/graywolf-0.1.6/include/yalecad/message.h:45:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT9(a,b,c,d,e,f,g,h,i)  { sprintf(YmsgG,a,b,c,d,e,f,g,h,i) ; \
data/graywolf-0.1.6/include/yalecad/message.h:48:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT8(a,b,c,d,e,f,g,h)    { sprintf(YmsgG,a,b,c,d,e,f,g,h)   ; \
data/graywolf-0.1.6/include/yalecad/message.h:51:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT7(a,b,c,d,e,f,g)      { sprintf(YmsgG,a,b,c,d,e,f,g)     ; \
data/graywolf-0.1.6/include/yalecad/message.h:54:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT6(a,b,c,d,e,f)        { sprintf(YmsgG,a,b,c,d,e,f)       ; \
data/graywolf-0.1.6/include/yalecad/message.h:57:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT5(a,b,c,d,e)          { sprintf(YmsgG,a,b,c,d,e)         ; \
data/graywolf-0.1.6/include/yalecad/message.h:60:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT4(a,b,c,d)            { sprintf(YmsgG,a,b,c,d)           ; \
data/graywolf-0.1.6/include/yalecad/message.h:63:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT3(a,b,c)              { sprintf(YmsgG,a,b,c)             ; \
data/graywolf-0.1.6/include/yalecad/message.h:66:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT2(a,b)                { sprintf(YmsgG,a,b)               ; \
data/graywolf-0.1.6/include/yalecad/message.h:69:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT1(a)                  { sprintf(YmsgG,a)                 ; \
data/graywolf-0.1.6/include/yalecad/message.h:73:36:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define OUT()                    { sprintf(YmsgG,a)                 ; \
data/graywolf-0.1.6/include/yalecad/string.h:44:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
extern char *strcat( P2( char *str1, char *str2 ) ) ; 
data/graywolf-0.1.6/include/yalecad/string.h:46:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
extern char *strcpy( P2( char *str1, char *str2 ) ) ; 
data/graywolf-0.1.6/src/Ylib/buster.c:284:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG," %s : There must be at least 4 corners\n", user_messageS ) ;
data/graywolf-0.1.6/src/Ylib/buster.c:290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG," %s : There must be an even # of corners\n", user_messageS ) ;
data/graywolf-0.1.6/src/Ylib/buster.c:327:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"%s @(%d,%d)\n", user_messageS, xx1, yy1 );
data/graywolf-0.1.6/src/Ylib/buster.c:332:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG," %s @(%d,%d)\n", 
data/graywolf-0.1.6/src/Ylib/buster.c:353:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/cleanup.c:105:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( programPath, "%s", argv ) ;
data/graywolf-0.1.6/src/Ylib/cleanup.c:197:2:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	scanf( "%s", response ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( resource, "geometry_%s", dialogname ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:237:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( resource, "font_%s", dialogname ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:696:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( data, dptr->string ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:742:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat( data, buffer ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:866:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/dialog.c:904:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy( group, tokens[CASEGROUP] ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:446:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"Not Fatal:can't find data directory:%s\n", dirNameS );
data/graywolf-0.1.6/src/Ylib/draw.c:1659:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "font:%s not available - using default:fixed\n", fname ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2067:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/cell.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2072:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/net.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2077:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/symb.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2145:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( fileName,"%s/cell.bin.%d",dirNameS,frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/file.c:89:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not open file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:124:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "ERROR[Yfile_slink]:%s", pathname ) ;
data/graywolf-0.1.6/src/Ylib/file.c:177:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not open file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:183:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not lock file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:195:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not get file descriptor %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:216:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not open file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:253:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not open file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:259:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not lock file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:270:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not get file descriptor %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/file.c:290:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"could not open file %s\n",filename ) ;
data/graywolf-0.1.6/src/Ylib/getftime.c:66:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "ERROR[YgetFileTime] - %s", filename ) ;
data/graywolf-0.1.6/src/Ylib/graph.c:3347:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy( data->name, string ) ;
data/graywolf-0.1.6/src/Ylib/log.c:68:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.log", cktNameS ) ;    
data/graywolf-0.1.6/src/Ylib/log.c:84:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( cktNameS, design ) ;
data/graywolf-0.1.6/src/Ylib/log.c:85:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.log", cktNameS ) ;    
data/graywolf-0.1.6/src/Ylib/menus.c:1084:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( persistent_messageS, message ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1191:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat( data, buffer ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1198:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( curMsg, directions ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1199:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( curMsg, data ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1649:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"Couldn't find any menu data in file:%s\n",
data/graywolf-0.1.6/src/Ylib/okmalloc.c:521:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( alloc_name, "%s:%d", file, line ) ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:530:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy( name_data->name, alloc_name ) ;
data/graywolf-0.1.6/src/Ylib/path.c:87:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pathname, given_path ) ;
data/graywolf-0.1.6/src/Ylib/path.c:104:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( temp, getpath(user) );
data/graywolf-0.1.6/src/Ylib/path.c:107:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( temp, rest ) ;
data/graywolf-0.1.6/src/Ylib/path.c:136:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( temp, tokens[numtokens-1] ) ;
data/graywolf-0.1.6/src/Ylib/path.c:140:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( pathname, usrpath ) ; 
data/graywolf-0.1.6/src/Ylib/path.c:145:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( cur_dir, tokens[i] ) ;
data/graywolf-0.1.6/src/Ylib/path.c:147:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( cur_dir, temp ) ;
data/graywolf-0.1.6/src/Ylib/path.c:163:7:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
char *getlogin();
data/graywolf-0.1.6/src/Ylib/path.c:172:12:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	    who = getlogin();
data/graywolf-0.1.6/src/Ylib/plot.c:99:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( gptr->fileName,"%s",graphName ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:143:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/plot.c:217:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/plot.c:232:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( copyformatS,"%s",control ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:245:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf( fp, tokenBuf[0], gint ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:256:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf( fp, tokenBuf[0], gchar ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:263:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf( fp, tokenBuf[0], gstr ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:270:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    fprintf( fp, tokenBuf[0], gdoub ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:285:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( copyformatS,"%s",format ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:296:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( fp, tokenBuf[i], gint ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:304:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( fp, tokenBuf[i], gchar ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:308:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( fp, tokenBuf[i], gstr ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:312:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( fp, tokenBuf[i], gdoub ) ;
data/graywolf-0.1.6/src/Ylib/plot.c:342:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/program.c:91:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(programName,"%s",name);
data/graywolf-0.1.6/src/Ylib/program.c:92:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(progVersion,"%s",version);
data/graywolf-0.1.6/src/Ylib/program.c:95:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(progDate,"%s",date);
data/graywolf-0.1.6/src/Ylib/program.c:99:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( YmsgG, "%s version:%s date:%s",
data/graywolf-0.1.6/src/Ylib/program.c:135:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(message,"\n%s terminated abnormally with %d error[s] and %d warning[s]\n\n",
data/graywolf-0.1.6/src/Ylib/program.c:138:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(message,"\n%s terminated normally with no errors and %d warning[s]\n\n",
data/graywolf-0.1.6/src/Ylib/rbtree.c:1252:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( data->name, string ) ;
data/graywolf-0.1.6/src/Ylib/relpath.c:61:36:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    char *Yfixpath(), *strrchr(), *strcat() ;
data/graywolf-0.1.6/src/Ylib/relpath.c:65:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( known_fpath, known_path ) ;
data/graywolf-0.1.6/src/Ylib/relpath.c:103:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( known_fpath, rel_path ) ;
data/graywolf-0.1.6/src/Ylib/string.c:77:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    return( (char *) strcpy( YMALLOC(strlen(str)+1, char), str ) ) ;
data/graywolf-0.1.6/src/Ylib/system.c:59:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if( status = system( exec_statement ) ){
data/graywolf-0.1.6/src/Ylib/system.c:64:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Program %s returned with exit code:%d\n",program,
data/graywolf-0.1.6/src/Ylib/system.c:81:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "/bin/cp %s %s", sourcefile, destfile ) ;
data/graywolf-0.1.6/src/Ylib/system.c:88:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "/bin/mv %s %s", sourcefile, destfile ) ;
data/graywolf-0.1.6/src/Ylib/system.c:95:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "/bin/rm -rf %s", files ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:116:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"Can't find data directory:%s\n", dirNameS );
data/graywolf-0.1.6/src/Ylib/wgraphics.c:173:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/cell.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/net.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:183:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/symb.bin.%d", dirNameS, frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:245:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( fileName,"%s/cell.bin.%d",dirNameS,frameCountS ) ;
data/graywolf-0.1.6/src/Ylib/ydebug.c:146:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "/bin/cp %s %s.bak", DBGFILE,DBGFILE ) ;
data/graywolf-0.1.6/src/Ylib/ydebug.c:147:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    system( YmsgG ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:220:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:240:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", rule, type ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:308:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( key, "%s/%s:%c", object1, object2, type ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:310:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( key, "%s/%s:%c", object2, object1, type ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:365:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s.%s", design_name, suffix ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:368:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( filterNameS, pname ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:496:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "Unknown rule at line:%d in filename:%s\n", 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:554:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( copy_bufferS, bufferptr ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:572:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/yreadpar.c:646:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG,
data/graywolf-0.1.6/src/Ylib/yreadpar.c:692:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s/%s:%c", object1, object2, SPACING_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:698:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:717:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", object, WIDTH_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:722:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:755:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", object, RESISTANCE_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:760:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:779:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", object, CAPACITANCE_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:784:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:804:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", object, DIRECTION_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:809:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:828:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( key, "%s:%c", object, LAYER_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:833:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:877:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( key, "%s/%s:%c", object1, object2, VIA_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:879:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( key, "%s/%s:%c", object2, object1, VIA_T ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:884:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/date/getdate.c:60:1:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
system("date > date.h") ;
data/graywolf-0.1.6/src/genrows/draw.c:525:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.gsav", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:527:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Note: restore state file exists:%s\n\n",
data/graywolf-0.1.6/src/genrows/draw.c:856:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s.redo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:878:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s.gsav", reply ) ;
data/graywolf-0.1.6/src/genrows/draw.c:881:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "ERROR:could not open file:%s",
data/graywolf-0.1.6/src/genrows/draw.c:903:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s.gsav", reply ) ;
data/graywolf-0.1.6/src/genrows/draw.c:906:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "ERROR:could not open file:%s",
data/graywolf-0.1.6/src/genrows/draw.c:913:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "Genrows saved state:%s", reply ) ;
data/graywolf-0.1.6/src/genrows/draw.c:917:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s.undo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1247:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s.undo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1249:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s.redo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1262:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.tmp", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1359:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( YmsgG,"%s","If correct, enter <cr>. Otherwise ") ;
data/graywolf-0.1.6/src/genrows/draw.c:2244:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( buffer, "ERROR[%s]:", routine ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2251:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( buffer, "WARNING[%s]:", routine ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2259:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( buffer, string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2261:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "%s\n", string ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:269:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.blk", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:405:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.gen", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:622:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "total_row_length" */
data/graywolf-0.1.6/src/genrows/genrows.c:623:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR, &row_length ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:647:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "actual_row_height" */
data/graywolf-0.1.6/src/genrows/genrows.c:648:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR, &actual_row_heightS ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:649:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "channel_separation" */
data/graywolf-0.1.6/src/genrows/genrows.c:650:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR, &channel_separationS ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:651:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "min_length" */
data/graywolf-0.1.6/src/genrows/genrows.c:652:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR, &min_lengthS ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:653:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "core" */
data/graywolf-0.1.6/src/genrows/genrows.c:654:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR " " INTSCANSTR, &cx1S , &cy1S ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:655:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR " " INTSCANSTR, &cx2S , &cy2S ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:656:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "grid" */
data/graywolf-0.1.6/src/genrows/genrows.c:657:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR " " INTSCANSTR, &xgrid , &ygrid ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:658:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s", string ) ; /* "num_macros" */
data/graywolf-0.1.6/src/genrows/genrows.c:659:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR, &num_macrosG ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:691:12:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    while( fscanf(fp,"%s", string ) == 1 ) {  /* "macro" */
data/graywolf-0.1.6/src/genrows/genrows.c:694:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s", string ) ;  /* orient */
data/graywolf-0.1.6/src/genrows/genrows.c:695:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR, &(mptr->orient) ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:696:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR, &num_vertices ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:697:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s", string ) ; /* "vertices" */
data/graywolf-0.1.6/src/genrows/genrows.c:706:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	    fscanf(fp, INTSCANSTR " " INTSCANSTR, &x , &y ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:767:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp,"%s " INTSCANSTR, string , &feed_lengthS ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:769:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp,"%s " INTSCANSTR, string , &spacingG ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:771:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp,"%s " INTSCANSTR, string , &numtiles ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:813:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf( fp, INTSCANSTR, &start ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:818:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " " INTSCANSTR
data/graywolf-0.1.6/src/genrows/genrows.c:824:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " " INTSCANSTR,
data/graywolf-0.1.6/src/genrows/genrows.c:828:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " %d",
data/graywolf-0.1.6/src/genrows/main.c:190:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.mver", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/main.c:260:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.gsav", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/main.c:266:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.undo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/main.c:270:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.redo", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:195:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/readpar.c:233:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "The value for %s was", keyword );
data/graywolf-0.1.6/src/genrows/readpar.c:249:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.out", cktNameG ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:306:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.row", cktNameG ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:250:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf( YmsgG, 
data/graywolf-0.1.6/src/mc_compact/io.c:575:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mcpt", cktNameG ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:267:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mrte", cktNameG ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:281:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.mrte:", cktNameG );
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:283:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:370:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "\nsyntax error - found:%s expected:",
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:382:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:395:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:259:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mvio", cktNameG ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:272:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.mvio:", cktNameG );
data/graywolf-0.1.6/src/mc_compact/readtiles.c:274:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/mc_compact/readtiles.c:361:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "\nsyntax error - found:%s expected:",
data/graywolf-0.1.6/src/mc_compact/readtiles.c:373:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:386:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mincut/main.c:141:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(command, "awk -f %s/bin/splt_file.a %s.cel", twdir , cktNameG ) ;
data/graywolf-0.1.6/src/mincut/main.c:145:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.cel", cktNameG ) ;
data/graywolf-0.1.6/src/mincut/main.c:150:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.mcel", cktNameG ) ;
data/graywolf-0.1.6/src/mincut/main.c:155:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/mincut/main.c:179:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( YmsgG, 
data/graywolf-0.1.6/src/mincut/output.c:100:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( current_cellS, cellname ) ;
data/graywolf-0.1.6/src/mincut/output.c:145:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "Trouble adding signal:%s to hash table\n",
data/graywolf-0.1.6/src/mincut/readcells.c:816:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.cel:", cktNameG );
data/graywolf-0.1.6/src/mincut/readcells.c:818:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/mincut/readcells.c:904:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "Found %s.\nExpected ",
data/graywolf-0.1.6/src/mincut/readcells.c:918:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:933:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:957:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:972:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/syntax/main.c:124:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/syntax/main.c:127:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.temp", cktNameG ) ;
data/graywolf-0.1.6/src/syntax/main.c:133:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.cel", cktNameG ) ;
data/graywolf-0.1.6/src/syntax/main.c:149:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.temp", cktNameG ) ;
data/graywolf-0.1.6/src/syntax/main.c:150:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename2, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/syntax/main.c:164:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( YmsgG, 
data/graywolf-0.1.6/src/syntax/output.c:99:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( current_cellS, cellname ) ;
data/graywolf-0.1.6/src/syntax/output.c:141:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "Trouble adding signal:%s to hash table\n",
data/graywolf-0.1.6/src/syntax/output.c:226:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "x location should be L or R:%s\n", current_cellS ) ;
data/graywolf-0.1.6/src/syntax/output.c:236:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "y location should be B or T:%s\n", current_cellS ) ;
data/graywolf-0.1.6/src/syntax/output.c:257:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG,
data/graywolf-0.1.6/src/syntax/output.c:269:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( cur_pinnameS, pinname ) ;
data/graywolf-0.1.6/src/syntax/output.c:277:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Pin:%s cell:%s @(%d,%d) is outside cell boundary\n",
data/graywolf-0.1.6/src/syntax/readcells.c:822:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.cel:", cktNameG );
data/graywolf-0.1.6/src/syntax/readcells.c:824:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/syntax/readcells.c:910:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "Found %s.\nExpected ",
data/graywolf-0.1.6/src/syntax/readcells.c:924:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:939:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:963:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:978:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:167:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s%s", cktNameG, fdepend->fname+1 ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:169:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( filename, fdepend->fname ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:172:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "ERROR:input file %s does not exist",
data/graywolf-0.1.6/src/twflow/autoflow.c:190:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Trouble executing %s", 
data/graywolf-0.1.6/src/twflow/autoflow.c:215:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s%s", cktNameG, fdepend->fname+1 ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:217:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( filename, fdepend->fname ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:248:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( filename, "%s%s", cktNameG, fdepend->fname+1 ) ;
data/graywolf-0.1.6/src/twflow/autoflow.c:250:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( filename, fdepend->fname ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:127:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s/%s.%s", flow_dirG, prefix, suffix ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:132:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s/bin/flow/%s/%s.%s", twdirG, flow_dirG, prefix, suffix ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:138:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "\n\t%s\n", filename ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:141:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "\t%s/%s.%s\n", flow_dirG, prefix,suffix);
data/graywolf-0.1.6/src/twflow/findflow.c:150:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.%s", prefix, suffix ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:153:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s/bin/flow/flow/%s.%s",twdirG,prefix,suffix ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:197:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buffer, "%s/bin/syntax %s", twdirG, cktNameG ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:208:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	status = system( buffer ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:221:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/twflow/graphics.c:323:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( YmsgG,"%s","If edge is not correct, enter n<cr> ") ;
data/graywolf-0.1.6/src/twflow/graphics.c:393:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Selected program:%s", proGraphG[obj]->name ) ;
data/graywolf-0.1.6/src/twflow/graphics.c:432:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf( stdout, "%s", reply ) ;
data/graywolf-0.1.6/src/twflow/main.c:219:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "\n\tFlow directory given:%s\n\n", flow_dirG );
data/graywolf-0.1.6/src/twflow/main.c:231:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "/tmp/twsc.%s", cktNameG ) ;
data/graywolf-0.1.6/src/twflow/main.c:248:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/flow/flow", twdirG ) ;
data/graywolf-0.1.6/src/twflow/main.c:312:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( message,"\n%s\n",YmsgG) ;
data/graywolf-0.1.6/src/twflow/main.c:324:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( command, "%s/bin/show_flows", twdirG ) ;
data/graywolf-0.1.6/src/twflow/program.c:83:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Executing %s", obj->name)  ;
data/graywolf-0.1.6/src/twflow/program.c:94:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( command, "%s", Yfixpath( obj->path,TRUE ) ) ;
data/graywolf-0.1.6/src/twflow/program.c:97:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( command, "%s/bin/%s", twdirG, obj->name ) ;
data/graywolf-0.1.6/src/twflow/program.c:104:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat( command, cktNameG ) ;
data/graywolf-0.1.6/src/twflow/program.c:105:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat( command, argv[i]+1 ) ;
data/graywolf-0.1.6/src/twflow/program.c:112:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat( command, window_name ) ;
data/graywolf-0.1.6/src/twflow/program.c:116:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat( command, flow_dirG ) ;
data/graywolf-0.1.6/src/twflow/program.c:118:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	    strcat( command, argv[i] ) ;
data/graywolf-0.1.6/src/twflow/program.c:121:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    D( "twflow/executePgm", sprintf( YmsgG, "%s\n", command ) ) ;
data/graywolf-0.1.6/src/twflow/program.c:125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s started...", obj->name ) ;
data/graywolf-0.1.6/src/twflow/program.c:129:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    status = system( command ) ;
data/graywolf-0.1.6/src/twflow/program.c:131:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s completed...", obj->name ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:327:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading:%s\n", filenameS );
data/graywolf-0.1.6/src/twflow/readobjects.c:329:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n\n" ,
data/graywolf-0.1.6/src/twflow/readobjects.c:416:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "Found %s.\nExpected ",
data/graywolf-0.1.6/src/twflow/readobjects.c:430:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:445:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:469:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:484:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/analyze.c:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "%s.log", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/compact.c:120:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.mvio" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/compact.c:233:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/%s", twdir, COMPACTPROG ) ;
data/graywolf-0.1.6/src/twmc/compact.c:237:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s -vn %s %d %d %d %d %d %d", pathname,
data/graywolf-0.1.6/src/twmc/compact.c:241:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s -vn %s %d %d %d %d %d %d", pathname,
data/graywolf-0.1.6/src/twmc/compact.c:249:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s -cn %s %d %d %d %d 0 0", pathname,
data/graywolf-0.1.6/src/twmc/compact.c:253:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( YmsgG, "%s -c %s %d %d %d %d 0 0", pathname,
data/graywolf-0.1.6/src/twmc/compact.c:272:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.mcpt" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/config1.c:222:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( savfile, "%s.msav", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/config1.c:223:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( resfile, "%s.mres", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/debug.c:359:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("rm -f DATA/*" ) ;
data/graywolf-0.1.6/src/twmc/debug.c:366:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename,"%s/cell.file.%d",dataDir,k) ;
data/graywolf-0.1.6/src/twmc/debug.c:397:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename,"%s/net.file.%d",dataDir,k ) ;
data/graywolf-0.1.6/src/twmc/debug.c:405:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename,"%s/pin.file.%d",dataDir,k ) ;
data/graywolf-0.1.6/src/twmc/finalpin.c:458:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/finalpin.c:645:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, " pin:%s cell:%d\n",
data/graywolf-0.1.6/src/twmc/finalpin.c:688:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( YmsgG, "Overfill for pin:%s cell:%d\n",
data/graywolf-0.1.6/src/twmc/findside.c:195:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "Pin:%s has inconsistent restrictions\n",
data/graywolf-0.1.6/src/twmc/findside.c:211:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/findside.c:237:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "Pin:%s has no valid side\n", pin->pinname ) ;
data/graywolf-0.1.6/src/twmc/fixcell.c:283:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "cell:%s neighborhood larger than core\n",
data/graywolf-0.1.6/src/twmc/fixcell.c:357:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "cell:%s fix point larger than core\n",
data/graywolf-0.1.6/src/twmc/gmain.c:123:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/%s", twdir, GENGRAPHPROG ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:128:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s -nr %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:133:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "%s -w %s %d", pathname,cktNameG,windowId ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:135:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "%s -n %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:170:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.mtle", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:661:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Selected cell:%d - %s", cell,
data/graywolf-0.1.6/src/twmc/graphics.c:681:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( YmsgG, "Selected cell:%d - %s", cell,
data/graywolf-0.1.6/src/twmc/graphics.c:685:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( YmsgG,"%s","If correct, enter <cr>. Otherwise ") ;
data/graywolf-0.1.6/src/twmc/graphics.c:928:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(label,"C%d:%s",cell, cptr->cname ) ; 
data/graywolf-0.1.6/src/twmc/graphics.c:1158:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( name, "Name:    %s", ptr->cname ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1335:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Fixing cell:%d - %s @ (%d,%d)",
data/graywolf-0.1.6/src/twmc/initialize.c:366:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Cellnames not unique:%s\n", curCellNameS ) ;
data/graywolf-0.1.6/src/twmc/initialize.c:532:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Unknown side:%s\n", side ) ;
data/graywolf-0.1.6/src/twmc/initialize.c:632:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Incorrect number of corners for cell:%s\n",
data/graywolf-0.1.6/src/twmc/initialize.c:639:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/initialize.c:672:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( YmsgG, " (cell:%s) ", curCellNameS ) ;
data/graywolf-0.1.6/src/twmc/initialize.c:904:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "Trouble adding signal:%s to hash table\n",
data/graywolf-0.1.6/src/twmc/initialize.c:912:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"No match for net:%s in primary instance:%s\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1015:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"No match for pin:%s in primary instance:%s\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1125:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Pin:%s cell:%s @(%d,%d) is outside cell boundary\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1294:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1300:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1306:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1388:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"No match for pingroup:%s in primary instance:%s\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1435:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1477:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1500:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(YmsgG,"cannot find pin <%s> for pin_group <%s>\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1516:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1522:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1528:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1564:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1597:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/initialize.c:1625:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"pad group %s was included in more than 1 pad group\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1647:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(YmsgG,"cannot find pad <%s> for pad_group <%s>\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1662:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Couldn't find cellname:%s for group\n",cellName );
data/graywolf-0.1.6/src/twmc/initialize.c:1680:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "cell %d:%s appears in more than one group\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1798:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Incorrect number of vertices for pin:%s\n",
data/graywolf-0.1.6/src/twmc/initialize.c:1853:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, " (cell:%s pin:%s) ", curCellNameS, pinS->pinname ) ;
data/graywolf-0.1.6/src/twmc/initnets.c:122:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "net:%s - number:%d out of bounds\n",
data/graywolf-0.1.6/src/twmc/initnets.c:367:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "Pin:%s on cell:%s could not be found in net:%s\n",
data/graywolf-0.1.6/src/twmc/initnets.c:395:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "Pin:%s include twice in common pt\n",
data/graywolf-0.1.6/src/twmc/initnets.c:427:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/initnets.c:460:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/main.c:219:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( filename, "%s.mout" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:262:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( filename, "%s.mout" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:296:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.mcel" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:298:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(filename, "%s.cel" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:306:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mest", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:336:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.mnet", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:339:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(filename, "%s.net", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:356:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.msav", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:417:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.mres", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:424:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/main.c:433:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/main.c:604:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename,"%s.history", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:655:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( arguments, "%s -", argv0G ) ;
data/graywolf-0.1.6/src/twmc/main.c:684:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( arguments, temp ) ;
data/graywolf-0.1.6/src/twmc/main.c:687:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat( arguments, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/main.c:691:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( arguments, temp ) ;
data/graywolf-0.1.6/src/twmc/mergecell.c:70:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"softcells can't be merged-cell:%s\n",
data/graywolf-0.1.6/src/twmc/mergecell.c:76:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"softcells can't be merged-cell:%s\n",
data/graywolf-0.1.6/src/twmc/mergecell.c:85:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"pads and custom cells can't be merged-pad:%s cell:%s\n",
data/graywolf-0.1.6/src/twmc/mergecell.c:92:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"pads and custom cells can't be merged-pad:%s cell:%s\n",
data/graywolf-0.1.6/src/twmc/mergecell.c:100:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"No tile data is present for cell:%s. Aborting merge.\n",
data/graywolf-0.1.6/src/twmc/mergecell.c:106:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"No bounding box data is present for cell:%s. Aborting merge.\n",
data/graywolf-0.1.6/src/twmc/outgeo.c:96:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename, "%s.mgeo", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/outpin.c:103:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mpin", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/output.c:132:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s.mdat", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/output.c:587:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.pl1" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/output.c:596:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( tmp_name , cellptr->cname ) ;
data/graywolf-0.1.6/src/twmc/output.c:601:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twmc/output.c:603:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twmc/output.c:615:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( tmp_name , cellptr->cname ) ;
data/graywolf-0.1.6/src/twmc/output.c:620:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twmc/output.c:622:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twmc/output.c:697:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.pin" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:151:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/%s", twdir, GENROWPROG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:155:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    G( sprintf( YmsgG, "%s -w %s %lu", 
data/graywolf-0.1.6/src/twmc/partition.c:159:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:161:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s -n %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:206:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:307:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.scel", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:309:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename_out, "%s.temp", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:356:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.mver" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/partition.c:419:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.gen" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/paths.c:125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.mpth" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/penalties.c:180:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.lap", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:832:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.pads", cktNameG );
data/graywolf-0.1.6/src/twmc/placepads.c:853:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/%s", twdir, PLACEPADPROG ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:858:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "%s -asn %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:861:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "%s -usn %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:864:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( YmsgG, "%s -osn %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:878:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.pout" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/placepin.c:1246:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/placepin.c:1258:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/readcells.c:777:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.[m]cel:", cktNameG );
data/graywolf-0.1.6/src/twmc/readcells.c:779:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/twmc/readcells.c:867:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "Found %s.\nExpected ",
data/graywolf-0.1.6/src/twmc/readcells.c:881:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:896:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:920:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:935:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:360:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.mnet:", cktNameG );
data/graywolf-0.1.6/src/twmc/readnets.c:362:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/twmc/readnets.c:450:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "Found %s.\nExpected ",
data/graywolf-0.1.6/src/twmc/readnets.c:464:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:479:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:503:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:518:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:185:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( design, cktNameG ) ; 
data/graywolf-0.1.6/src/twmc/readpar.c:468:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/readpar.c:473:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/readpar.c:667:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Please read %s.mout for details\n\n",cktNameG ) ;
data/graywolf-0.1.6/src/twmc/rmain.c:73:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename, "%s.gpar", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/rmain.c:106:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s/bin/%s", twdir, GROUTEPROG ) ;
data/graywolf-0.1.6/src/twmc/rmain.c:109:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( YmsgG, "%s %s", pathname, cktNameG ) ;
data/graywolf-0.1.6/src/twmc/savewolf.c:116:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.mtmp" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/savewolf.c:119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.msav" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/savewolf.c:121:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.sav;-2" , cktNameG ) ;
data/graywolf-0.1.6/src/twmc/savewolf.c:170:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file1, "%s.mtmp", cktNameG);
data/graywolf-0.1.6/src/twmc/savewolf.c:171:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file2, "%s.msav", cktNameG);
data/graywolf-0.1.6/src/twmc/savewolf.c:243:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf( fp , INTSCANSTR, &inst ) ;
data/graywolf-0.1.6/src/twmc/savewolf.c:375:21:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    numread = (INT) fscanf(fp,"%s\n",YmsgG);
data/graywolf-0.1.6/src/twmc/uloop.c:1102:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.mset", cktNameG ) ;
data/graywolf-0.1.6/src/twmc/wireratio.c:286:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( filename, "%s.mest", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/buildimp.c:309:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( imptr->pinname, "%s", "1" ) ;
data/graywolf-0.1.6/src/twsc/buildimp.c:310:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( imptr->eqpinname, "%s", "2" ) ;
data/graywolf-0.1.6/src/twsc/cell_width.c:126:1:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
system("clear");
data/graywolf-0.1.6/src/twsc/cell_width.c:391:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  nptr = strcat(nptr,add_ptr);
data/graywolf-0.1.6/src/twsc/cell_width.c:572:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( copyBuf, bufferptr ) ;
data/graywolf-0.1.6/src/twsc/cell_width.c:587:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        	strcpy( copyBuf, bufferptr ) ;
data/graywolf-0.1.6/src/twsc/findcost.c:285:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.res" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/findcost.c:288:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.cmi" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/findcost.c:507:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/findcost.c:511:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/findcost.c:876:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( nfilename , "n%s.cel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/globe.c:1757:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Invalid rotation for cell:%s\n", ptr->cname ) ;
data/graywolf-0.1.6/src/twsc/graphics.c:538:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(label,"C%d:%s",cell, carrayG[cell]->cname ) ; 
data/graywolf-0.1.6/src/twsc/main.c:262:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename , "%s.out" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/main.c:287:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename , "%s.blk" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/main.c:302:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.scel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/main.c:304:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.cel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/main.c:320:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( filename , "%s.net" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/main.c:699:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf( command, "%s/bin/SGGR %s", twdirS, cktNameG  ) ;
data/graywolf-0.1.6/src/twsc/main.c:879:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( imptr->pinname , "%s" , netptr->pinname ) ;
data/graywolf-0.1.6/src/twsc/main.c:880:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf( imptr->eqpinname , "%s" , netptr->eqptr->pinname ) ;
data/graywolf-0.1.6/src/twsc/outcm.c:70:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.cm" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/outcm.c:130:1:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
fscanf(fp, INTSCANSTR, &pin_count ) ;
data/graywolf-0.1.6/src/twsc/outcm.c:133:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " "
data/graywolf-0.1.6/src/twsc/outpins.c:140:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.pin" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:417:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:419:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:421:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:422:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:424:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:428:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:430:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:432:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:433:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:479:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:481:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:483:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:484:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:486:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:490:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:492:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:494:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:495:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:604:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_pinname , ptr->pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:627:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:629:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:631:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:632:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:634:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:638:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:640:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:642:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:643:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:692:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:694:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:696:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:697:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:699:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:703:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:705:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:707:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:708:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:757:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:759:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:761:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:762:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:764:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:768:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:770:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:772:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:773:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:843:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:845:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:847:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:848:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:850:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:854:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:856:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:858:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:859:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:922:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( pinbufL, &(pinname[2]) ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:925:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( pinbufL, pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:929:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( pinbufL, pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:128:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.pin" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:399:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:401:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:403:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:404:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:406:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:410:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:412:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:414:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:415:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:661:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:663:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:665:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:666:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:668:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:672:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:674:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:676:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:677:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:727:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:729:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:731:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:732:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:734:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:738:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:740:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:742:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:743:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:787:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_pinname , ptr->pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:793:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:795:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:797:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:798:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:800:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:804:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:806:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:808:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:809:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:874:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:876:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:878:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( p_name , "%s" , tmp_pinname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:879:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( pin_id , "%s" , "0" ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:881:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy( tmp_name , carrayG[ptr->cell]->cname ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:885:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:887:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:889:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( master_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:890:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/output.c:117:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.pl1" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/output.c:120:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.pl2" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/output.c:174:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy( ctmp , cellptr->cname ) ;
data/graywolf-0.1.6/src/twsc/output.c:178:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( cellptr->cname , "%s%s" , "twspacer",
data/graywolf-0.1.6/src/twsc/output.c:195:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( tmp_name , cellptr->cname ) ;
data/graywolf-0.1.6/src/twsc/output.c:200:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/output.c:202:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/output.c:263:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( tmp_name , cellptr->cname ) ;
data/graywolf-0.1.6/src/twsc/output.c:268:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( instance_name, "%s" , tmp_string ) ;
data/graywolf-0.1.6/src/twsc/output.c:270:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( instance_name , "%s" , tmp_name ) ;
data/graywolf-0.1.6/src/twsc/output.c:452:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.scel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/output.c:455:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename , "%s.cel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/output.c:458:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.ncel" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/output.c:471:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( cell_name , strtok( NULL , " 	" ) ) ;
data/graywolf-0.1.6/src/twsc/output.c:496:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy( fixed_string , strtok( NULL , " 	" ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "%s.stat", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/parser.c:251:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Found hints in <%s.stat> file\n", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/parser.c:440:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Current cell number:%d  Name:<%s>\n\n", 
data/graywolf-0.1.6/src/twsc/parser.c:449:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "current cell number:%d  Name:<%s>\n\n", 
data/graywolf-0.1.6/src/twsc/parser.c:473:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/parser.c:492:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/parser.c:528:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG, "Problem with swap hash table for group <%s>\n", swap_name );
data/graywolf-0.1.6/src/twsc/parser.c:563:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG, "Implicit swap group <%s> created\n", swap_name );
data/graywolf-0.1.6/src/twsc/parser.c:631:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( imptrS->pinname , "]%1d%s" , layer, pin_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:646:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(imptrS->eqpinname,"]%1d%s", layer, pin_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:735:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Trouble adding signal:%s to hash table\n", signal ) ;
data/graywolf-0.1.6/src/twsc/parser.c:802:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( pinptrS->pinname , "]%1d%s" , layer, pin_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:894:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "the pin <%s> assigned to cell <%s> is\n",
data/graywolf-0.1.6/src/twsc/parser.c:944:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( eqptrL->pinname , "]%1d%s", layer, equiv_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:959:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( eqptrL->pinname , "]%1d%s", layer, equiv_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:963:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(eqptrL->pinname,"%s", equiv_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:973:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( imptrS->eqpinname , "]%1d%s" , layer, equiv_name ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1011:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Current cell number:%d  Name:<%s>\n", 
data/graywolf-0.1.6/src/twsc/parser.c:1046:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG,"block class specified for cell <%s> was\n",
data/graywolf-0.1.6/src/twsc/parser.c:1105:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Unknown fixed type:%s\n", fixed_type ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1125:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "Invalid fixed_location:%s\n", fixed_loc ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1133:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG, "block assigned to cell <%s> was\n", curCellNameS );
data/graywolf-0.1.6/src/twsc/parser.c:1250:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( buffer,"]%1d%s%d",feedLayerG,"SPACER_FEED_TOP_", pin ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1252:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( buffer, "%s%d" , "SPACER_FEED_TOP_" , pin ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1262:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( buffer, "]%1d%s%d",feedLayerG,"SPACER_FEED_BOTTOM_",pin );
data/graywolf-0.1.6/src/twsc/parser.c:1264:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( buffer, "%s%d" , "SPACER_FEED_BOTTOM_" , pin );
data/graywolf-0.1.6/src/twsc/parser.c:1405:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( YmsgG, "Problem with pin %s\n", pinptr->pinname ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1535:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( YmsgG, "\tpad:%s is bogus\n", ptr->cname ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1684:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/parser.c:1736:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, "\nmacros <%s> and <%s> overlap -- FATAL\n",
data/graywolf-0.1.6/src/twsc/parser.c:1741:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG, "\npads (or macros) <%s> and <%s> overlap -- NONFATAL\n",
data/graywolf-0.1.6/src/twsc/parser.c:1759:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "initial placement assigned to cell <%s> is\n",
data/graywolf-0.1.6/src/twsc/parser.c:1811:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "%s is not supported -- sorry!\n", object ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1979:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf( YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2007:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2013:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2019:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2071:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2098:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(YmsgG,
data/graywolf-0.1.6/src/twsc/parser.c:2121:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"cannot find pad <%s> for pad_group <%s>\n",
data/graywolf-0.1.6/src/twsc/parser.c:2141:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( YmsgG, "\t%s only has %d pad\n", curCellNameS, 
data/graywolf-0.1.6/src/twsc/paths.c:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s.pth" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/readblck.c:97:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
while( fscanf( fp , " %s " , input ) == 1 ) {
data/graywolf-0.1.6/src/twsc/readblck.c:151:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	test = fscanf(fp, INTSCANSTR " " INTSCANSTR, &lowerL_x, &upperR_x ) ;
data/graywolf-0.1.6/src/twsc/readblck.c:157:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	test = fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " " INTSCANSTR,
data/graywolf-0.1.6/src/twsc/readblck.c:218:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
while( fscanf( fp , " %s " , input ) == 1 ) {
data/graywolf-0.1.6/src/twsc/readblck.c:237:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR " " INTSCANSTR, &lowerL_x, &upperR_x ) ;
data/graywolf-0.1.6/src/twsc/readblck.c:247:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	fscanf(fp, INTSCANSTR " " INTSCANSTR " " INTSCANSTR " " INTSCANSTR,
data/graywolf-0.1.6/src/twsc/readcell.c:692:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"problem reading %s.scel:", cktNameG );
data/graywolf-0.1.6/src/twsc/readcell.c:694:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(YmsgG,"problem reading %s.cel:", cktNameG );
data/graywolf-0.1.6/src/twsc/readcell.c:697:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/twsc/readcell.c:784:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "\nsyntax error - found:%s expected:",
data/graywolf-0.1.6/src/twsc/readcell.c:796:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twsc/readcell.c:809:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:350:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG,"problem reading %s.net:", cktNameG );
data/graywolf-0.1.6/src/twsc/readnets.c:352:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(YmsgG, "  line %d near '%s' : %s\n" ,
data/graywolf-0.1.6/src/twsc/readnets.c:451:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/readnets.c:533:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( YmsgG, "The net named: %s  in the .net file ", net );
data/graywolf-0.1.6/src/twsc/readnets.c:626:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( err_msg, "\nsyntax error - found:%s expected:",
data/graywolf-0.1.6/src/twsc/readnets.c:638:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:651:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat( err_msg, yyname[i] ) ;
data/graywolf-0.1.6/src/twsc/reconfig.c:173:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    fscanf( fp , INTSCANSTR , &feed_lengthS ) ;
data/graywolf-0.1.6/src/twsc/reconfig.c:227:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.pl2", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/reconfig.c:290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( filename, "%s.pl1", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:98:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.sav" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:100:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.sav;-2" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:103:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename , "%s.tmp" , cktNameG ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:132:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(file1, "%s.tmp", cktNameG);
data/graywolf-0.1.6/src/twsc/savewolf.c:133:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(file2, "%s.sav", cktNameG);
data/graywolf-0.1.6/src/twsc/savewolf.c:153:1:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
fscanf( fp , INTSCANSTR , &iterationG ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:154:1:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
fscanf( fp , INTSCANSTR , &numfds ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:155:1:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
fscanf( fp , INTSCANSTR , &dummy ) ;
data/graywolf-0.1.6/src/twsc/savewolf.c:177:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( YmsgG, "block out of bounds for cell:%s\n",
data/graywolf-0.1.6/src/twsc/seagate.c:156:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename, "%s.sgpar", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/seagate.c:205:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename, "%s.sgnet", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/seagate.c:266:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( filename, "%s.sgpass", cktNameG ) ;
data/graywolf-0.1.6/src/twsc/upair.c:292:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf( YmsgG, " %3d %6.3f %9d  %3d%s  %-8ld\n", iterationG+1, TG, funccostG,
data/graywolf-0.1.6/src/twsc/utemp.c:446:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(YmsgG,"Global router is eliminating net: <%s>\n",
data/graywolf-0.1.6/src/Ylib/path.c:77:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *getenv() ;          /* get the users environment path */
data/graywolf-0.1.6/src/Ylib/path.c:138:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    usrpath = getenv( "PATH" ) ;
data/graywolf-0.1.6/src/Ylib/system.c:102:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *getenv() ;
data/graywolf-0.1.6/src/Ylib/system.c:104:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    return( (char *) getenv( env_var ) ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:302:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:304:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/mc_compact/readtiles.c:293:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/mc_compact/readtiles.c:295:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/mincut/main.c:134:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/mincut/readcells.c:836:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/mincut/readcells.c:838:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/syntax/readcells.c:842:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/syntax/readcells.c:844:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/twflow/main.c:115:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if((twdirG = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twflow/readobjects.c:348:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/twflow/readobjects.c:350:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/twmc/compact.c:100:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *getenv() ;    /* used to get TWDIR environment variable */
data/graywolf-0.1.6/src/twmc/compact.c:227:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twmc/gmain.c:93:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *getenv() ;    /* used to get TWDIR environment variable */
data/graywolf-0.1.6/src/twmc/gmain.c:117:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twmc/partition.c:126:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *getenv() ;    /* used to get TWDIR environment variable */
data/graywolf-0.1.6/src/twmc/partition.c:145:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twmc/placepads.c:847:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twmc/readcells.c:799:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/twmc/readcells.c:801:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/twmc/readnets.c:382:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/twmc/readnets.c:384:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/twmc/rmain.c:69:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *getenv() ;    /* used to get TWDIR environment variable */
data/graywolf-0.1.6/src/twmc/rmain.c:100:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if((twdir = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twsc/main.c:271:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if((twdirS = getenv("TWDIR"))) {
data/graywolf-0.1.6/src/twsc/readcell.c:716:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/twsc/readcell.c:718:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/src/twsc/readnets.c:558:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    extern char *getenv();
data/graywolf-0.1.6/src/twsc/readnets.c:560:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (yys = getenv("YYDEBUG"))
data/graywolf-0.1.6/include/yalecad/debug.h:46:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:59:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:73:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:88:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:101:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:117:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/include/yalecad/debug.h:132:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char assertMsg_xz[LRECL] ; \
data/graywolf-0.1.6/src/Ylib/cleanup.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char programPath[LRECL] ;
data/graywolf-0.1.6/src/Ylib/cleanup.c:134:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char command[LRECL] ;
data/graywolf-0.1.6/src/Ylib/cleanup.c:137:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( command, "/com/tb %d", pid ) ;
data/graywolf-0.1.6/src/Ylib/cleanup.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char responseBuf[LRECL], *response = responseBuf ;
data/graywolf-0.1.6/src/Ylib/colors.c:58:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *TWstdcolorArrayS[NUMCOLORS+1] = {
data/graywolf-0.1.6/src/Ylib/colors.c:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char stipple_patS[30*8] = {
data/graywolf-0.1.6/src/Ylib/deck.c:285:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[LRECL] = "Ydeck_verify";
data/graywolf-0.1.6/src/Ylib/dialog.c:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resource[LRECL] ;/* look for match in database */
data/graywolf-0.1.6/src/Ylib/dialog.c:682:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;    /* used for keyboard translation */
data/graywolf-0.1.6/src/Ylib/dialog.c:683:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char curMsg[LRECL] ;    /* current value of message window */
data/graywolf-0.1.6/src/Ylib/dialog.c:684:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[LRECL];       /* current value of users input */
data/graywolf-0.1.6/src/Ylib/dialog.c:787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/Ylib/dialog.c:788:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char group[LRECL] ;  /* for parsing case groups */
data/graywolf-0.1.6/src/Ylib/dialog.c:832:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:836:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    numfields = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:847:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Problem parsing line:%d in dialog file\n",
data/graywolf-0.1.6/src/Ylib/dialog.c:853:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    fptr->column = atoi( tokens[COLUMN] ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:854:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    fptr->row = atoi( tokens[ROW] ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:855:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    fptr->len = atoi( tokens[LEN] ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:909:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			case_label = atoi( tokens[i] ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:922:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Problem parsing line:%d in dialog file\n",
data/graywolf-0.1.6/src/Ylib/draw.c:553:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	TWsafe_wait_timeG = atoi( reply ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:949:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, "new center - %d,%d", x1, y1 ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1198:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Color number:%d is out of range", color ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1238:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Color number:%d is out of range", color ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1295:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Color number:%d is out of range", color ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1432:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Color number:%d is out of range", color ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1983:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Color number:%d is out of range", color ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2030:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/Ylib/draw.c:2031:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[5] ;
data/graywolf-0.1.6/src/Ylib/draw.c:2092:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[5] ;
data/graywolf-0.1.6/src/Ylib/draw.c:2135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[LRECL] ;
data/graywolf-0.1.6/src/Ylib/file.c:86:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fileptr = fopen( filename, readwrite );
data/graywolf-0.1.6/src/Ylib/file.c:120:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[BUFSIZ] ;
data/graywolf-0.1.6/src/Ylib/file.c:214:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open( filename, O_RDONLY, 0 ) ;
data/graywolf-0.1.6/src/Ylib/file.c:288:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open( filename, O_RDONLY, 0 ) ;
data/graywolf-0.1.6/src/Ylib/graph.c:2031:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[32] = "Ygraph_nodeRequired";
data/graywolf-0.1.6/src/Ylib/graph.c:2105:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[32] = "Ygraph_edgePrime";
data/graywolf-0.1.6/src/Ylib/graph.c:2132:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[32] = "steiner_trace_back";
data/graywolf-0.1.6/src/Ylib/graph.c:2208:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[32] = "Ygraph_requiredPath";
data/graywolf-0.1.6/src/Ylib/graph.c:2409:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[16] = "Ygraph_steiner";
data/graywolf-0.1.6/src/Ylib/graph.c:2535:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char routineNameS[32]="Ygraph_steinerImprove";
data/graywolf-0.1.6/src/Ylib/log.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cktNameS[LRECL] = " " ; 
data/graywolf-0.1.6/src/Ylib/log.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;    /* log file name */
data/graywolf-0.1.6/src/Ylib/log.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;    /* log file name */
data/graywolf-0.1.6/src/Ylib/menus.c:199:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char persistent_messageS[LRECL];/* stores persistent message */
data/graywolf-0.1.6/src/Ylib/menus.c:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char windowIdString[LRECL] ; /* buffer for window id string */
data/graywolf-0.1.6/src/Ylib/menus.c:311:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( !(menuS = atoi( prop ))){
data/graywolf-0.1.6/src/Ylib/menus.c:317:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( !(messageS = atoi( prop ))){
data/graywolf-0.1.6/src/Ylib/menus.c:323:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( !(drawS = atoi( prop ))){
data/graywolf-0.1.6/src/Ylib/menus.c:352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char windowIdString[LRECL] ; /* buffer for window id string */
data/graywolf-0.1.6/src/Ylib/menus.c:387:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( windowIdString, "%d", drawS ) ; /* store as a string */
data/graywolf-0.1.6/src/Ylib/menus.c:390:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( windowIdString, "%d", menuS ) ; /* store as a string */
data/graywolf-0.1.6/src/Ylib/menus.c:393:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( windowIdString, "%d", messageS ) ;/* store as a string */
data/graywolf-0.1.6/src/Ylib/menus.c:419:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	message_timeoutS = atoi( reply ) * 1000 ;
data/graywolf-0.1.6/src/Ylib/menus.c:1134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;    /* used for keyboard translation */
data/graywolf-0.1.6/src/Ylib/menus.c:1135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char curMsg[LRECL] ;    /* current value of message window */
data/graywolf-0.1.6/src/Ylib/menus.c:1136:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char data[LRECL];/* current value of users input */
data/graywolf-0.1.6/src/Ylib/menus.c:1272:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *x = atoi( tokens[0] ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1273:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    *y = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/Ylib/menus.c:1633:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1642:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Problem parsing line:%d in menu file\n",
data/graywolf-0.1.6/src/Ylib/menus.c:1686:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		mptr->action_index = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1689:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    mptr->action_indexb = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1691:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    mptr->bool_init = atoi( tokens[4] ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1698:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Problem parsing line:%d in menu file\n", 
data/graywolf-0.1.6/src/Ylib/menus.c:1703:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Problem parsing line:%d in menu file\n", 
data/graywolf-0.1.6/src/Ylib/menus.c:1727:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char bufferL[LRECL] ;
data/graywolf-0.1.6/src/Ylib/menus.c:1756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;       /* copy of the menu item */
data/graywolf-0.1.6/src/Ylib/message.c:89:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char message_bufS[LRECL] ;
data/graywolf-0.1.6/src/Ylib/message.c:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char typeS[8] ;
data/graywolf-0.1.6/src/Ylib/message.c:109:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case ERRMSG:sprintf(typeS,"ERROR");
data/graywolf-0.1.6/src/Ylib/message.c:117:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case WARNMSG:sprintf(typeS,"WARNING");
data/graywolf-0.1.6/src/Ylib/message.c:126:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case DBGMSG:sprintf(typeS,"DEBUG");
data/graywolf-0.1.6/src/Ylib/mytime.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL],
data/graywolf-0.1.6/src/Ylib/mytime.c:103:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buffer, "%d", t ) ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[ALLOC_NAME_SIZE] ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:364:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf( YmsgG, "Alternate MEMORY MANagement system invoked - allocation:%d bytes\n", allocation ) ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:518:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char alloc_name[BUFSIZ] ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:569:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( filename, "mem.data.%d", ++dump_noL ) ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:698:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       ptr2[i] = ((char *) ptr)[i];
data/graywolf-0.1.6/src/Ylib/path.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathname[LRECL] ;    /* copy of given_path */
data/graywolf-0.1.6/src/Ylib/path.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cur_dir[LRECL] ;     /* current working directory */
data/graywolf-0.1.6/src/Ylib/path.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[LRECL] ;        /* temporary buffer */
data/graywolf-0.1.6/src/Ylib/plot.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  fileName[LRECL] ;
data/graywolf-0.1.6/src/Ylib/plot.c:193:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char copyformatS[LRECL] ;
data/graywolf-0.1.6/src/Ylib/program.c:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char programName[LRECL];
data/graywolf-0.1.6/src/Ylib/program.c:71:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char progVersion[LRECL];
data/graywolf-0.1.6/src/Ylib/program.c:72:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char progDate[LRECL];
data/graywolf-0.1.6/src/Ylib/program.c:97:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(progDate,"unknown") ;
data/graywolf-0.1.6/src/Ylib/program.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    message[LRECL] ,
data/graywolf-0.1.6/src/Ylib/program.c:143:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(message,"Program terminated abnormally with %d error[s] and %d warning[s]\n\n",
data/graywolf-0.1.6/src/Ylib/radixsort.c:477:4:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   bcopy(l2,bot,n * sizeof(blob *));
data/graywolf-0.1.6/src/Ylib/radixsort.c:604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sort_weight[15] ;
data/graywolf-0.1.6/src/Ylib/radixsort.c:614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[20] ;
data/graywolf-0.1.6/src/Ylib/radixsort.c:627:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( sort_field, "%10d", aptr->weight ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1261:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer1[LRECL] ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1262:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer2[LRECL] ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1286:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "jumped" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1294:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key2.name, "jumped" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1306:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "history" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1312:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "fox" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1321:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "over" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1322:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key2.name, "the" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1332:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "the" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1333:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key2.name, "the" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1350:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key1.name, "airplane" ) ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1351:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( key2.name, "airplane" ) ;
data/graywolf-0.1.6/src/Ylib/relpath.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char known_fpath[LRECL] ; /* full path of known obj */
data/graywolf-0.1.6/src/Ylib/stats.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	hostname[256]	;
data/graywolf-0.1.6/src/Ylib/string.c:90:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *tokenBuf[LRECL] ; /* impossible to have more tokens */
data/graywolf-0.1.6/src/Ylib/wgraphics.c:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[5] ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dummy[5] ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[LRECL] ;
data/graywolf-0.1.6/src/Ylib/ydebug.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/Ylib/ydebug.c:182:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    data = make_data_debug( tokens[0], atoi(tokens[1]) ) ;
data/graywolf-0.1.6/src/Ylib/ydebug.c:185:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:144:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char copy_bufferS[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:145:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:149:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filterNameS[5] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:245:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Rule on line:%d already exists. Ignored.\n", lineS ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:316:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Rule on line:%d already exists. Ignored.\n", lineS ) ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;      /* the file name */
data/graywolf-0.1.6/src/Ylib/yreadpar.c:686:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:711:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:749:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:773:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:797:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:822:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:850:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/Ylib/yreadpar.c:868:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  key[LRECL] ;
data/graywolf-0.1.6/src/Ylib/yreadpar.c:900:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, 
data/graywolf-0.1.6/src/date/getdate.c:56:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char        *date ,
data/graywolf-0.1.6/src/date/getdate.c:62:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if( !(fp = fopen("date.h","r" ))){ 
data/graywolf-0.1.6/src/date/getdate.c:73:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if( !(fp = fopen("date.h","w" ))){ 
data/graywolf-0.1.6/src/genrows/draw.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     label[LRECL] ; /* make a label buffer */
data/graywolf-0.1.6/src/genrows/draw.c:227:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "SEGMENT:%d CLASS:%d", rowptr->seg, rowptr->class);
data/graywolf-0.1.6/src/genrows/draw.c:229:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "SEGMENT:%d CLASS:1", rowptr->seg ) ;
data/graywolf-0.1.6/src/genrows/draw.c:232:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat( label, " MIRROR" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:245:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			    sprintf( label, "SEGMENT:%d CLASS:%d",
data/graywolf-0.1.6/src/genrows/draw.c:248:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			    sprintf( label, "SEGMENT:%d CLASS:1", segment->seg ) ;
data/graywolf-0.1.6/src/genrows/draw.c:251:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			    strcat( label, " MIRROR" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:306:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			    sprintf( label, "SEGMENT:%d CLASS:%d",
data/graywolf-0.1.6/src/genrows/draw.c:309:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			    sprintf( label, "SEGMENT:%d CLASS:1", segment->seg ) ;
data/graywolf-0.1.6/src/genrows/draw.c:312:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			    strcat( label, " MIRROR" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     label[LRECL] ; /* make a label buffer */
data/graywolf-0.1.6/src/genrows/draw.c:362:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( label, "TILE:%d", tileptr->name ) ;
data/graywolf-0.1.6/src/genrows/draw.c:386:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;     /* buffer for name */
data/graywolf-0.1.6/src/genrows/draw.c:398:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( label, "%d", i ) ;
data/graywolf-0.1.6/src/genrows/draw.c:403:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( label, "C:%d", macro ) ;
data/graywolf-0.1.6/src/genrows/draw.c:514:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL];/* file name */
data/graywolf-0.1.6/src/genrows/draw.c:596:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG,"The point is (%d,%d)",x,y ) ;
data/graywolf-0.1.6/src/genrows/draw.c:795:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Core is now llx:(%d,%d) urx:(%d,%d)", 
data/graywolf-0.1.6/src/genrows/draw.c:839:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    num_rowsG = atoi(reply) ;
data/graywolf-0.1.6/src/genrows/draw.c:1137:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    temp = atoi( reply ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1177:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    temp = atoi( reply ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/genrows/draw.c:1258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/genrows/draw.c:1337:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Selected macro:%d", selectMacroS ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1355:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG, "Selected cell:%d",
data/graywolf-0.1.6/src/genrows/draw.c:1360:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat( YmsgG,
data/graywolf-0.1.6/src/genrows/draw.c:1464:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    height = atoi( answer[ROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1478:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sep = atoi( answer[SEPF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1498:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    maxrows = atoi( answer[MAXROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1521:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[STARTF].string, "%d", selected_tileS->llx + spacingG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1522:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[MAXF].string, "%d", selected_tileS->urx - spacingG ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1531:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[MAXROWF].string, "%d", maxrows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1532:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	rows = atoi( answer[NUMROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1539:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( answer[NUMROWF].string, "%d", maxrows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1556:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[NUMROWF].string, "%d", maxrows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1557:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[SEPF].string, "%d", sep ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1562:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	rows = atoi( answer[NUMROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1571:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( answer[NUMROWF].string, "%d", maxrows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1581:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[MAXROWF].string, "%d", rows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1583:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( answer[NUMROWF].string, "%d", rows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tileName[FWIDTH]; /* a scratch buffer for tile name */
data/graywolf-0.1.6/src/genrows/draw.c:1604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char left[FWIDTH];     /* a scratch buffer for left tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1605:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char right[FWIDTH];    /* a scratch buffer for right tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char class[FWIDTH];    /* a scratch buffer for the class */
data/graywolf-0.1.6/src/genrows/draw.c:1607:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char top[FWIDTH];      /* a scratch buffer for top tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1608:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bottom[FWIDTH];   /* a scratch buffer for bottom tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1609:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char numrows[FWIDTH];  /* a scratch buffer for number of rows */
data/graywolf-0.1.6/src/genrows/draw.c:1610:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char maxrows[FWIDTH];  /* a scratch buffer for number of rows */
data/graywolf-0.1.6/src/genrows/draw.c:1611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rowHeight[FWIDTH];/* a scratch buffer for row height */
data/graywolf-0.1.6/src/genrows/draw.c:1612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char minlength[FWIDTH];/* a scratch buffer for minimum length of row */
data/graywolf-0.1.6/src/genrows/draw.c:1613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char maxlength[FWIDTH];/* a scratch buffer for maximum length of row */
data/graywolf-0.1.6/src/genrows/draw.c:1614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char separation[FWIDTH];/* a scratch buffer for row separation */
data/graywolf-0.1.6/src/genrows/draw.c:1615:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startrow[FWIDTH]; /* a scratch buffer for row separation */
data/graywolf-0.1.6/src/genrows/draw.c:1630:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( tileName,  "Tile  : %d", tile->name ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1633:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( left,  "Left  : %d", tile->llx ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1636:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( bottom,"Bottom: %d", tile->lly ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1639:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( right, "Right : %d", tile->urx ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1642:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( top,   "Top   : %d", tile->ury ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1652:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( rowHeight,   "%d", tile->actual_row_height ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1661:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( maxrows, "%d", max_rows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1663:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( numrows,   "%d", tile->numrows ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1666:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( minlength,   "%d", tile->min_length ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1669:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( startrow,   "%d", tile->llx + tile->row_start ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1672:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( maxlength,   "%d", 
data/graywolf-0.1.6/src/genrows/draw.c:1676:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( separation,   "%d", tile->channel_separation ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1678:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( class,  "%d", tile->class ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1728:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    rows = atoi( answer[MAXROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1749:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    rows = atoi( answer[NUMROWF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1770:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi( answer[MINF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1780:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi( answer[MAXF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1795:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi( answer[STARTF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1822:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi( answer[CLASSF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1851:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char left[FWIDTH];     /* a scratch buffer for left tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1852:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char right[FWIDTH];    /* a scratch buffer for right tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1853:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char top[FWIDTH];      /* a scratch buffer for top tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1854:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bottom[FWIDTH];   /* a scratch buffer for bottom tile side */
data/graywolf-0.1.6/src/genrows/draw.c:1855:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char class[FWIDTH];    /* a scratch buffer for the class */
data/graywolf-0.1.6/src/genrows/draw.c:1868:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( left,  "Left  : %d", rowptr->llx ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1871:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( bottom,"Bottom: %d", rowptr->lly ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1874:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( right, "Right : %d", rowptr->urx ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1877:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( top,   "Top   : %d", rowptr->ury ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1882:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( class, "%d", rowptr->class ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1898:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    temp = atoi( answer[CLASS_F].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1933:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	deltax = atoi( answer[DELTAXF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1936:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	deltay = atoi( answer[DELTAYF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1963:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pos = atoi( answer[XPOSF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1965:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[XPOSF].string, "%d", pos ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1970:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pos = atoi( answer[YPOSF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1972:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( answer[YPOSF].string, "%d", pos ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1982:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xpos[FWIDTH];     /* a scratch buffer for xpos */
data/graywolf-0.1.6/src/genrows/draw.c:1983:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ypos[FWIDTH];     /* a scratch buffer for ypos */
data/graywolf-0.1.6/src/genrows/draw.c:1984:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char deltax[FWIDTH];   /* a scratch buffer for deltax */
data/graywolf-0.1.6/src/genrows/draw.c:1985:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char deltay[FWIDTH];   /* a scratch buffer for deltay */
data/graywolf-0.1.6/src/genrows/draw.c:1998:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( xpos,  "%d", xoff ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2000:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( ypos, "%d", yoff ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2019:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    pos = atoi( answer[XPOSF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2027:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    pos = atoi( answer[YPOSF].string ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;
data/graywolf-0.1.6/src/genrows/draw.c:2246:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( buffer, "ERROR:" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2253:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( buffer, "WARNING:" ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/genrows/genrows.c:611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[LRECL] ;
data/graywolf-0.1.6/src/genrows/genrows.c:628:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/genrows.c:761:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[LRECL] ;
data/graywolf-0.1.6/src/genrows/genrows.c:900:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[LRECL] ;
data/graywolf-0.1.6/src/genrows/genrows.c:1830:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( YmsgG, "Macro %d overlaps macro %d.\n",
data/graywolf-0.1.6/src/genrows/main.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ; /* used for input filename */
data/graywolf-0.1.6/src/genrows/main.c:138:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/genrows/main.c:168:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          windowId = atoi( argv[3] ) ;
data/graywolf-0.1.6/src/genrows/main.c:295:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/readpar.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char design[LRECL] ;
data/graywolf-0.1.6/src/genrows/readpar.c:119:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		temp = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:143:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		temp = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:155:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		temp = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:166:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		temp = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/genrows/readpar.c:212:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/readpar.c:235:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, " not properly entered in the .par file\n");
data/graywolf-0.1.6/src/genrows/readpar.c:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/genrows/readpar.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;
data/graywolf-0.1.6/src/genrows/readpar.c:264:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/readpar.c:280:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/genrows/readpar.c:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr = buffer ;
data/graywolf-0.1.6/src/genrows/readpar.c:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL];
data/graywolf-0.1.6/src/mc_compact/cdraw.c:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;
data/graywolf-0.1.6/src/mc_compact/cdraw.c:193:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( label, "C%d:T%d", t->cell, i ) ;
data/graywolf-0.1.6/src/mc_compact/cdraw.c:232:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:250:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:252:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:270:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:289:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:306:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:308:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:327:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:345:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:364:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( label, "%d", eptr->constraint );
data/graywolf-0.1.6/src/mc_compact/cdraw.c:496:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG,"The point is (%d,%d)",x,y ) ;
data/graywolf-0.1.6/src/mc_compact/cdraw.c:506:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "Selected cell is :%d", selectCellS ) ;
data/graywolf-0.1.6/src/mc_compact/cdraw.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label_buf[LRECL] ;        /* buffer for labels */
data/graywolf-0.1.6/src/mc_compact/cdraw.c:573:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( label, "N%d", i ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:124:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:133:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	blockrG = atoi( argv[3] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:134:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	blocktG = atoi( argv[4] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:135:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	xgridG = atoi( argv[5] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:136:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ygridG = atoi( argv[6] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:137:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	xspaceG = atoi( argv[7] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:138:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	yspaceG = atoi( argv[8] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:168:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		windowId = atoi( argv[9] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:174:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	blockrG = atoi( argv[2] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:175:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	blocktG = atoi( argv[3] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:176:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	xgridG = atoi( argv[4] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:177:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ygridG = atoi( argv[5] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:178:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	xspaceG = atoi( argv[6] ) ;
data/graywolf-0.1.6/src/mc_compact/cmain.c:179:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	yspaceG = atoi( argv[7] ) ;
data/graywolf-0.1.6/src/mc_compact/compact.h:124:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
#define MEMUSAGE   { sprintf( YmsgG,"Current memory usage:%d\n", \
data/graywolf-0.1.6/src/mc_compact/compactor.c:349:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG, 
data/graywolf-0.1.6/src/mc_compact/compactor.c:387:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG, 
data/graywolf-0.1.6/src/mc_compact/io.c:436:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Zero width tile found for tile:%d\n", i ) ;
data/graywolf-0.1.6/src/mc_compact/io.c:447:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Zero width tile found for tile:%d\n", i ) ;
data/graywolf-0.1.6/src/mc_compact/io.c:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/mc_compact/multi.c:213:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, 
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:70:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:368:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:378:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:391:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:75:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:172:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG, "comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:174:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:442:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:444:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/mc_compact/readtiles.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:359:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:369:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles.c:382:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:79:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:171:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:173:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:497:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:499:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/mc_compact/stdmacro.c:353:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG,"Topology error with tile:%d\n",
data/graywolf-0.1.6/src/mc_compact/stdmacro.c:363:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG,"   %d\n", node )  ;
data/graywolf-0.1.6/src/mc_compact/stdmacro.c:390:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "swapping nodes:%d =><= %d\n", node1, node2 ) ) ;
data/graywolf-0.1.6/src/mc_compact/xcompact.c:154:36:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    D( "mc_compact/buildXGraph", sprintf( YmsgG, 
data/graywolf-0.1.6/src/mc_compact/xcompact.c:237:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "e1 is NULL; fromNode: %d\n", fromNode ) ) ;
data/graywolf-0.1.6/src/mc_compact/xcompact.c:242:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "e2 is NULL; toNode: %d\n", toNode ) ) ;
data/graywolf-0.1.6/src/mc_compact/xcompact.c:295:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Edge %d - %d has a negative edge weight\n", 
data/graywolf-0.1.6/src/mc_compact/ycompact.c:252:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "e1 is NULL; fromNode: %d\n", fromNode ) ) ;
data/graywolf-0.1.6/src/mc_compact/ycompact.c:257:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "e2 is NULL; toNode: %d\n", toNode ) ) ;
data/graywolf-0.1.6/src/mc_compact/ycompact.c:276:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Edge %d - %d has a negative edge weight\n", 
data/graywolf-0.1.6/src/mincut/main.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/mincut/main.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[LRECL] ;
data/graywolf-0.1.6/src/mincut/main.c:104:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/mincut/output.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_cellS[LRECL] ; /* the current cell name */
data/graywolf-0.1.6/src/mincut/output.c:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cur_pinnameS[LRECL] ;  /* current pinname */
data/graywolf-0.1.6/src/mincut/output.c:104:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Read %4d objects so far...\n", objectS ) ;
data/graywolf-0.1.6/src/mincut/output.c:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char input[LRECL] ;
data/graywolf-0.1.6/src/mincut/readcells.c:105:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/mincut/readcells.c:902:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/mincut/readcells.c:914:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:929:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:944:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( err_msg, "Found unknown token.\nExpected ");
data/graywolf-0.1.6/src/mincut/readcells.c:953:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:968:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:1060:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/mincut/readcells.c:1068:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/mincut/readcells.c:1081:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/mincut/readcells.c:1190:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp[0].ival ) ;
data/graywolf-0.1.6/src/mincut/readcells.c:1200:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp[0].fval ) ;
data/graywolf-0.1.6/src/mincut/readcells_l.h:85:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/mincut/readcells_l.h:217:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/mincut/readcells_l.h:219:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/mincut/readcells_l.h:522:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/mincut/readcells_l.h:524:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/syntax/main.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/syntax/main.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename2[LRECL] ;
data/graywolf-0.1.6/src/syntax/main.c:98:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/syntax/output.c:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_cellS[LRECL] ; /* the current cell name */
data/graywolf-0.1.6/src/syntax/output.c:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cur_pinnameS[LRECL] ;  /* current pinname */
data/graywolf-0.1.6/src/syntax/output.c:103:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Read %4d objects so far...\n", objectS ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:107:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/syntax/readcells.c:908:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/syntax/readcells.c:920:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:935:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:950:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( err_msg, "Found unknown token.\nExpected ");
data/graywolf-0.1.6/src/syntax/readcells.c:959:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:974:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:1066:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/syntax/readcells.c:1074:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/syntax/readcells.c:1088:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/syntax/readcells.c:1173:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/syntax/readcells.c:1257:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp[0].ival ) ;
data/graywolf-0.1.6/src/syntax/readcells.c:1267:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp[0].fval ) ;
data/graywolf-0.1.6/src/syntax/readcells_l.h:85:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/syntax/readcells_l.h:217:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/syntax/readcells_l.h:219:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/syntax/readcells_l.h:522:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/syntax/readcells_l.h:524:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twflow/autoflow.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       filename[LRECL] ;/* buffer for filename */
data/graywolf-0.1.6/src/twflow/autoflow.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       filename[LRECL] ;/* buffer for filename */
data/graywolf-0.1.6/src/twflow/findflow.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prefix[LRECL] ;
data/graywolf-0.1.6/src/twflow/findflow.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char suffix[LRECL] ;
data/graywolf-0.1.6/src/twflow/findflow.c:95:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( prefix, "user" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:100:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( prefix, "mixed" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:103:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( prefix, "standard" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:106:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( prefix, "macro" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:109:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( prefix, "tomus" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:118:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( suffix, "fdbg" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:120:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( suffix, "fnog" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:122:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( suffix, "flow" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char in_name[8] ;
data/graywolf-0.1.6/src/twflow/findflow.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out_name[8] ;
data/graywolf-0.1.6/src/twflow/findflow.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;
data/graywolf-0.1.6/src/twflow/findflow.c:183:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( in_name, "$.cel" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:184:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( out_name, "$.stat" ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:230:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    num_stdcell = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twflow/findflow.c:232:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    num_macro = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twflow/globals.h:101:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
#define MEMUSAGE   { sprintf( YmsgG,"Current memory usage:%d\n", \
data/graywolf-0.1.6/src/twflow/graphics.c:249:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG,"The point is (%d,%d)",x,y ) ;
data/graywolf-0.1.6/src/twflow/graphics.c:324:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat( YmsgG, 
data/graywolf-0.1.6/src/twflow/graphics.c:409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reply[LRECL] ;
data/graywolf-0.1.6/src/twflow/io.c:408:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Inconsistently defined edge %d -> %d \n",
data/graywolf-0.1.6/src/twflow/io.c:422:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Inconsistently defined edge %d -> %d \n",
data/graywolf-0.1.6/src/twflow/main.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        filename[LRECL] ;    /* buffer for filename */
data/graywolf-0.1.6/src/twflow/main.c:167:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/twflow/main.c:196:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          G( windowId = atoi( argv[++arg_count] ) ) ;
data/graywolf-0.1.6/src/twflow/main.c:289:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( YmsgG, "\ngraywolf [-gpndw] designName [windowId] [flowdirectory]\n" );
data/graywolf-0.1.6/src/twflow/main.c:310:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[LRECL] ;
data/graywolf-0.1.6/src/twflow/main.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[LRECL] ; 
data/graywolf-0.1.6/src/twflow/program.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[LRECL] ;
data/graywolf-0.1.6/src/twflow/program.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char window_name[LRECL] ;        /* the window name */
data/graywolf-0.1.6/src/twflow/program.c:109:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		G( sprintf( window_name, "%d", TWsaveState() ) ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/twflow/readobjects.c:414:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/twflow/readobjects.c:426:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:441:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:456:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( err_msg, "Found unknown token.\nExpected ");
data/graywolf-0.1.6/src/twflow/readobjects.c:465:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:480:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:656:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp[0].ival ) ;
data/graywolf-0.1.6/src/twflow/readobjects.c:666:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp[0].fval ) ;
data/graywolf-0.1.6/src/twflow/readobjects_l.h:75:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/twflow/readobjects_l.h:166:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/twflow/readobjects_l.h:168:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/twflow/readobjects_l.h:492:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/twflow/readobjects_l.h:494:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twmc/analyze.c:193:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf( YmsgG,"\n\nWire ratio updated to:%4.2f\n\n", wireRatio ) ;
data/graywolf-0.1.6/src/twmc/analyze.c:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/twmc/compact.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/compact.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/twmc/compact.c:290:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/compact.c:295:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( numcells != atoi(tokens[3] ) ){
data/graywolf-0.1.6/src/twmc/compact.c:306:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/compact.c:311:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cell = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/compact.c:315:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->xcenter = atoi(tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/compact.c:316:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->ycenter = atoi(tokens[5] ) ;
data/graywolf-0.1.6/src/twmc/compact.c:322:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/compact.c:328:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/config1.c:93:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char arguments[LRECL] ;
data/graywolf-0.1.6/src/twmc/config1.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char resfile[LRECL] ;
data/graywolf-0.1.6/src/twmc/config1.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char savfile[LRECL] ;
data/graywolf-0.1.6/src/twmc/config1.c:210:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG,
data/graywolf-0.1.6/src/twmc/debug.c:138:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "Problem with cell:%d bins\n" ) ;
data/graywolf-0.1.6/src/twmc/debug.c:356:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/debug.c:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;
data/graywolf-0.1.6/src/twmc/debug.c:372:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(label,"C%d orient:%d",i,orient) ; 
data/graywolf-0.1.6/src/twmc/debug.c:398:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( fp = fopen(filename,"w" )){ 
data/graywolf-0.1.6/src/twmc/debug.c:406:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( fp = fopen(filename,"w" )){ 
data/graywolf-0.1.6/src/twmc/finalout.c:171:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"\n\nCompactor Pass Number: %d begins with:\n", c ) ;
data/graywolf-0.1.6/src/twmc/finalout.c:182:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"\n\nCompactor Pass Number: %d after cost:\n", c ) ;
data/graywolf-0.1.6/src/twmc/finalpin.c:418:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "\t - %d sites < %d pins for cell:%d\n",
data/graywolf-0.1.6/src/twmc/finalpin.c:641:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/gmain.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/gmain.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/twmc/gmain.c:185:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cell = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:186:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      xc   = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:187:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      yc   = atoi( tokens[5] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:188:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      x1   = atoi( tokens[7] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:189:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      y1   = atoi( tokens[9] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:190:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      x2   = atoi( tokens[11] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:191:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      y2   = atoi( tokens[13] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:192:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      side = atoi( tokens[15] ) ;
data/graywolf-0.1.6/src/twmc/gmain.c:229:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char leftNotRight[2] ; /* reference to left or right side of core */
data/graywolf-0.1.6/src/twmc/graphics.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bottomNotTop[2] ; /* reference to bottom or top of core */
data/graywolf-0.1.6/src/twmc/graphics.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char leftNotRight2[2]; /* reference to left or right side of core */
data/graywolf-0.1.6/src/twmc/graphics.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bottomNotTop2[2]; /* reference to bottom or top of core */
data/graywolf-0.1.6/src/twmc/graphics.c:369:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG,"The point is (%d,%d)",x,y ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:573:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		drawNetS = atoi( reply ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:686:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat( YmsgG,
data/graywolf-0.1.6/src/twmc/graphics.c:714:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;
data/graywolf-0.1.6/src/twmc/graphics.c:796:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(label,"%d", bp->penalty ) ; 
data/graywolf-0.1.6/src/twmc/graphics.c:906:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;
data/graywolf-0.1.6/src/twmc/graphics.c:1137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[LRECL];    /* a scratch buffer for cellname */
data/graywolf-0.1.6/src/twmc/graphics.c:1138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cellnum[LRECL]; /* a scratch buffer for cellnum */
data/graywolf-0.1.6/src/twmc/graphics.c:1139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xcenter[LRECL]; /* a scratch buffer for xcenter */
data/graywolf-0.1.6/src/twmc/graphics.c:1140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ycenter[LRECL]; /* a scratch buffer for ycenter */
data/graywolf-0.1.6/src/twmc/graphics.c:1160:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( cellnum, "Number:  %d", ptr->cellnum ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1164:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( xcenter, "%d", ptr->xcenter ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1167:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( ycenter, "%d", ptr->ycenter ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1199:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    ptr->xcenter = atoi( answer[XCENTERF].string ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1204:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    ptr->ycenter = atoi( answer[YCENTERF].string ) ;
data/graywolf-0.1.6/src/twmc/graphics.c:1242:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/graphics.c:1327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char leftNotRight[2] ; /* reference to left or right side of core */
data/graywolf-0.1.6/src/twmc/graphics.c:1328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bottomNotTop[2] ; /* reference to bottom or top of core */
data/graywolf-0.1.6/src/twmc/initialize.c:1231:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"\n\tside:%d  range:1 to %d ", side, 
data/graywolf-0.1.6/src/twmc/initialize.c:1234:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG, "current cell is:%d\n", totalcellsG ) ;
data/graywolf-0.1.6/src/twmc/main.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    filename[LRECL],
data/graywolf-0.1.6/src/twmc/main.c:194:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            scale_dataG = atoi( argv[++arg_count] ) ;
data/graywolf-0.1.6/src/twmc/main.c:209:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/twmc/main.c:252:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          windowIdS = atoi( argv[++arg_count] ) ;
data/graywolf-0.1.6/src/twmc/main.c:601:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/main.c:634:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( YmsgG, 
data/graywolf-0.1.6/src/twmc/main.c:652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[LRECL] ; /* used to build strings */
data/graywolf-0.1.6/src/twmc/main.c:683:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( temp, "%d ", scale_dataG ) ;
data/graywolf-0.1.6/src/twmc/main.c:690:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( temp, " %d", window ) ;
data/graywolf-0.1.6/src/twmc/outgeo.c:90:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/outpin.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;  /* open this filename for writing */
data/graywolf-0.1.6/src/twmc/output.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/output.c:584:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instance_name[LRECL], tmp_name[LRECL], *tmp_string;
data/graywolf-0.1.6/src/twmc/output.c:585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL];
data/graywolf-0.1.6/src/twmc/output.c:692:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL];
data/graywolf-0.1.6/src/twmc/partition.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:214:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      tlengthS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:216:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cheightS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:218:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      num_classeS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:223:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      class = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:225:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      lbS[class_count] = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:226:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      ubS[class_count] = atoi( tokens[5] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:262:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/partition.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename_out[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/partition.c:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/twmc/partition.c:440:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cellptr->xcenter = atoi( tokens[0] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:441:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cellptr->ycenter = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:442:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cellptr->orient = atoi( tokens[2] ) ;
data/graywolf-0.1.6/src/twmc/partition.c:446:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        blocklG = MIN( blocklG, atoi( tokens[1] ) ) ;
data/graywolf-0.1.6/src/twmc/partition.c:447:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        blockbG = MIN( blockbG, atoi( tokens[2] ) ) ;
data/graywolf-0.1.6/src/twmc/partition.c:448:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        blockrG = MAX( blockrG, atoi( tokens[3] ) ) ;
data/graywolf-0.1.6/src/twmc/partition.c:449:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        blocktG = MAX( blocktG, atoi( tokens[4] ) ) ;
data/graywolf-0.1.6/src/twmc/partition.c:451:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Problem reading .gen file on line:%d\n",line ) ;
data/graywolf-0.1.6/src/twmc/paths.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/penalties.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/placepads.c:827:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/placepads.c:828:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LRECL] ;
data/graywolf-0.1.6/src/twmc/placepads.c:897:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:906:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->xcenter = atoi(tokens[2] ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:907:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->ycenter = atoi(tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:908:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->orient = atoi(tokens[4] ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:909:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      cellptr->padptr->padside = atoi(tokens[5] ) ;
data/graywolf-0.1.6/src/twmc/placepads.c:912:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf( YmsgG, "Syntax error on line:%d\n", line ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/twmc/readcells.c:865:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/twmc/readcells.c:877:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:892:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:907:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( err_msg, "Found unknown token.\nExpected ");
data/graywolf-0.1.6/src/twmc/readcells.c:916:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:931:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:1063:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/readcells.c:1071:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/readcells.c:1085:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(YmsgG,
data/graywolf-0.1.6/src/twmc/readcells.c:1402:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp2[0].ival ) ;
data/graywolf-0.1.6/src/twmc/readcells.c:1412:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp2[0].fval ) ;
data/graywolf-0.1.6/src/twmc/readcells_l.h:84:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/twmc/readcells_l.h:200:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG, "comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/twmc/readcells_l.h:202:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/twmc/readcells_l.h:507:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/twmc/readcells_l.h:509:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twmc/readnets.c:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/twmc/readnets.c:448:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/twmc/readnets.c:460:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:475:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:490:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( err_msg, "Found unknown token.\nExpected ");
data/graywolf-0.1.6/src/twmc/readnets.c:499:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:514:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:724:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp[0].ival ) ;
data/graywolf-0.1.6/src/twmc/readnets.c:734:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp[0].fval ) ;
data/graywolf-0.1.6/src/twmc/readnets_l.h:80:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/twmc/readnets_l.h:178:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG, "comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/twmc/readnets_l.h:180:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/twmc/readnets_l.h:507:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/twmc/readnets_l.h:509:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twmc/readpar.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char design[LRECL] ;
data/graywolf-0.1.6/src/twmc/readpar.c:235:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		randVarG = atoi(tokens[1]) ;
data/graywolf-0.1.6/src/twmc/readpar.c:248:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		defaultTracksG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:302:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		doCompactionG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:309:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blocklG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:310:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blockbG = atoi( tokens[2] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:311:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blockrG = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:312:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blocktG = atoi( tokens[4] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:324:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blocklG = atoi( tokens[2] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:325:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blockbG = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:326:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blockrG = atoi( tokens[4] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:327:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		blocktG = atoi( tokens[5] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:328:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		init_fixcell( atoi( tokens[2] ), atoi( tokens[3] ),
data/graywolf-0.1.6/src/twmc/readpar.c:328:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		init_fixcell( atoi( tokens[2] ), atoi( tokens[3] ),
data/graywolf-0.1.6/src/twmc/readpar.c:329:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    atoi( tokens[4] ), atoi( tokens[5] ) ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:329:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    atoi( tokens[4] ), atoi( tokens[5] ) ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:335:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		x_originG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:336:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		y_originG = atoi( tokens[2] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:343:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gOffsetXS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:349:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gOffsetYS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:355:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gridXS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:361:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gridYS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:367:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		speed = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:379:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		speed = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:398:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pins = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twmc/readpar.c:419:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		min_pad_spacingG = atoi( tokens[1] );
data/graywolf-0.1.6/src/twmc/rmain.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/savewolf.c:94:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/savewolf.c:95:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file1[LRECL] ;
data/graywolf-0.1.6/src/twmc/savewolf.c:96:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file2[LRECL] ;
data/graywolf-0.1.6/src/twmc/twstats.c:97:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG,
data/graywolf-0.1.6/src/twmc/uloop.c:1100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twmc/wireratio.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;  /* output the results of the SVD fit */
data/graywolf-0.1.6/src/twsc/acceptt.c:82:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fpS = fopen( "newcost.dat", "w" ) ;
data/graywolf-0.1.6/src/twsc/buildimp.c:270:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( cellptr->cname , "twfeed%d", feednum ) ;
data/graywolf-0.1.6/src/twsc/buildimp.c:272:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( cellptr->cname , "twfeed" ) ;
data/graywolf-0.1.6/src/twsc/cell_width.c:558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL], *bufferptr ;
data/graywolf-0.1.6/src/twsc/cell_width.c:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char copyBuf[LRECL] ;
data/graywolf-0.1.6/src/twsc/changrid.c:153:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    Yquicksort( (char *) ( gdptr[channel] + 1 ) , numPins[channel] ,
data/graywolf-0.1.6/src/twsc/debug2.c:598:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, "binpenalG:%d penal:%d\n", binpenalG, penal ) ;
data/graywolf-0.1.6/src/twsc/debug2.c:605:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, "rowpenalG:%d rpenal:%d\n", rowpenalG, rpenal ) ;
data/graywolf-0.1.6/src/twsc/findcost.c:105:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[256] ;
data/graywolf-0.1.6/src/twsc/findcost.c:867:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char nfilename[128] ;
data/graywolf-0.1.6/src/twsc/globe.c:190:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"initial total global wire   :\t%d\n", global_wire_lengthS);
data/graywolf-0.1.6/src/twsc/globe.c:192:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"initial total timing penalty:\t%d\n\n\n", timingcostG);
data/graywolf-0.1.6/src/twsc/globe.c:197:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"swap_limit:%d\n", swap_limitS ) ;
data/graywolf-0.1.6/src/twsc/globe.c:233:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"reduction:\t%d\t\ttotal_red:%d\n", swaps , 
data/graywolf-0.1.6/src/twsc/globe.c:244:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"iterations              :\t%d\n", iterations ) ;
data/graywolf-0.1.6/src/twsc/globe.c:246:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"final total global wire :\t%d\n", global_wire_lengthS ) ;
data/graywolf-0.1.6/src/twsc/globe.c:248:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"final total time penalty:\t%d\n", timingcostG ) ;
data/graywolf-0.1.6/src/twsc/globe.c:250:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"\nTotal global wire reduced by:\t%5.3f%%\n",
data/graywolf-0.1.6/src/twsc/globe.c:254:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"Total time penalty reduced by:\t%5.3f%%\n",
data/graywolf-0.1.6/src/twsc/globe.c:262:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"final total global wire :\t%d\n", global_wire_lengthS);
data/graywolf-0.1.6/src/twsc/globe.c:264:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"final total time penalty:\t%d\n\n\n", timingcostG);
data/graywolf-0.1.6/src/twsc/graphics.c:314:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG,"The point is (%d,%d)",x,y ) ;
data/graywolf-0.1.6/src/twsc/graphics.c:382:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		drawNetS = atoi( reply ) ;
data/graywolf-0.1.6/src/twsc/graphics.c:524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[LRECL] ;
data/graywolf-0.1.6/src/twsc/main.c:165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[LRECL] ;
data/graywolf-0.1.6/src/twsc/main.c:217:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( YmsgG,"Unknown option:%c\n", *ptr ) ;
data/graywolf-0.1.6/src/twsc/main.c:245:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          G( windowId = atoi( argv[++arg_count] ) ) ;
data/graywolf-0.1.6/src/twsc/main.c:618:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[LRECL] ;
data/graywolf-0.1.6/src/twsc/main.c:1021:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/netgraph.c:220:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    Yquicksort( (char *)(z_S[i]+1),
data/graywolf-0.1.6/src/twsc/netgraph.c:983:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    Yquicksort( (char *)(z_S[i]+1),
data/graywolf-0.1.6/src/twsc/outcm.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[64] ;
data/graywolf-0.1.6/src/twsc/outpins.c:118:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[64] ;
data/graywolf-0.1.6/src/twsc/outpins.c:298:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *pinname , tmp_char[2] , *tmp_pinname ;
data/graywolf-0.1.6/src/twsc/outpins.c:300:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins.c:301:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:458:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *pinname , tmp_char[2] , *tmp_pinname ;
data/graywolf-0.1.6/src/twsc/outpins.c:460:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins.c:461:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:598:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tmp_char[2] , tmp_pinname[1024] ;
data/graywolf-0.1.6/src/twsc/outpins.c:600:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins.c:601:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:609:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	layer = atoi( tmp_char ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:680:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tmp_char[2] , *tmp_pinname ;
data/graywolf-0.1.6/src/twsc/outpins.c:682:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins.c:683:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:740:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tmp_char[2] , *tmp_pinname ;
data/graywolf-0.1.6/src/twsc/outpins.c:747:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , *tmp_name ;
data/graywolf-0.1.6/src/twsc/outpins.c:748:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:826:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tmp_char[2] , *tmp_pinname ;
data/graywolf-0.1.6/src/twsc/outpins.c:833:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , *tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins.c:834:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins.c:912:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char pinbufL[LRECL] ;
data/graywolf-0.1.6/src/twsc/outpins.c:913:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char layer_buffer[2] ;
data/graywolf-0.1.6/src/twsc/outpins.c:921:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    *layer = atoi( layer_buffer ) ;
data/graywolf-0.1.6/src/twsc/outpins1.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[64] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:290:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:291:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins1.c:651:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:652:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins1.c:717:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:718:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins1.c:782:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:783:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/outpins1.c:864:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char master_name[128] , pin_id[128] , tmp_name[128] ;
data/graywolf-0.1.6/src/twsc/outpins1.c:865:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[128] , p_name[128] , *tmp_string ;
data/graywolf-0.1.6/src/twsc/output.c:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char a_lineS[LRECL] ;
data/graywolf-0.1.6/src/twsc/output.c:104:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[LRECL] , ctmp[32] ;
data/graywolf-0.1.6/src/twsc/output.c:111:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char instance_name[LRECL], tmp_name[LRECL], *tmp_string;
data/graywolf-0.1.6/src/twsc/output.c:446:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *token , fixed_string[32] , filename[256] ;
data/graywolf-0.1.6/src/twsc/output.c:447:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cell_name[32] ;
data/graywolf-0.1.6/src/twsc/parser.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ; /* temp storage */
data/graywolf-0.1.6/src/twsc/parser.c:224:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cellAllocS += atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/parser.c:230:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		netAllocS = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/parser.c:238:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    cellAllocS += atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/parser.c:242:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    cellAllocS += atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/parser.c:246:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    cellAllocS += atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/parser.c:254:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "Total cells:%d Number of nets:%d\n\n",cellAllocS++,netAllocS++) ;
data/graywolf-0.1.6/src/twsc/parser.c:898:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "\tcell l:%d r:%d b:%d t:%d  pin x:%d y:%d\n",
data/graywolf-0.1.6/src/twsc/parser.c:1171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;      /* temp buffer */
data/graywolf-0.1.6/src/twsc/parser.c:1202:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"Added %d spacer cells to the gate array\n", extra_cellsG);
data/graywolf-0.1.6/src/twsc/parser.c:1218:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"Added %d spacer cells to the gate array\n", extra_cellsG);
data/graywolf-0.1.6/src/twsc/parser.c:1231:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buffer, "twfeed%d", 100000 + totalCellS ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1233:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buffer, "twfeed" ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1632:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/parser.c:1762:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "\toutside the length of its block (%d vs. %d)\n",
data/graywolf-0.1.6/src/twsc/paths.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;
data/graywolf-0.1.6/src/twsc/paths.c:785:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, 
data/graywolf-0.1.6/src/twsc/readblck.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char input[1024] ;
data/graywolf-0.1.6/src/twsc/readcell.c:102:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/twsc/readcell.c:782:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/twsc/readcell.c:792:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twsc/readcell.c:805:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twsc/readcell.c:900:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( YmsgG,
data/graywolf-0.1.6/src/twsc/readcell.c:1177:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp2[0].ival ) ;
data/graywolf-0.1.6/src/twsc/readcell.c:1186:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp2[0].fval ) ;
data/graywolf-0.1.6/src/twsc/readcell_l.h:76:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/twsc/readcell_l.h:206:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/twsc/readcell_l.h:208:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/twsc/readcell_l.h:511:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/twsc/readcell_l.h:513:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twsc/readnets.c:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char bufferS[LRECL] ;
data/graywolf-0.1.6/src/twsc/readnets.c:534:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat( YmsgG, "was not encountered\n" ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:538:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( YmsgG,"\twhile reading the .cel file --- FATAL error\n") ;
data/graywolf-0.1.6/src/twsc/readnets.c:543:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( YmsgG, 
data/graywolf-0.1.6/src/twsc/readnets.c:624:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char err_msg[BUFSIZ] ;
data/graywolf-0.1.6/src/twsc/readnets.c:634:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:647:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                            strcat( err_msg, " | " ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:776:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%d", yyvsp[0].ival ) ;
data/graywolf-0.1.6/src/twsc/readnets.c:786:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( bufferS,"%f", yyvsp[0].fval ) ;
data/graywolf-0.1.6/src/twsc/readnets_l.h:77:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		         yylval.ival = atoi( yytext ) ;
data/graywolf-0.1.6/src/twsc/readnets_l.h:165:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"comment beginning at line %d ",line_countS+1 );
data/graywolf-0.1.6/src/twsc/readnets_l.h:167:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"exceeds maximum allowed length:%d chars.\n", 
data/graywolf-0.1.6/src/twsc/readnets_l.h:469:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yytext[YYLMAX];
data/graywolf-0.1.6/src/twsc/readnets_l.h:471:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char yysbuf[YYLMAX];
data/graywolf-0.1.6/src/twsc/readpar.c:204:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		tw_fastG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:210:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		tw_slowG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:257:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		approximately_fixed_factorG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:326:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		good_initial_placementG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:398:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		connection_machineG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:458:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		global_routing_iterationsG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:476:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pins = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:491:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		fdWidthG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:494:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		fdWidthG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:495:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		feedLayerG = atoi( tokens[3] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:506:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		total_row_lengthG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:512:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		spacer_widthG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:520:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		spacer_tmp = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:533:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		vertical_pitchG = atoi( tokens[1] ) ; 
data/graywolf-0.1.6/src/twsc/readpar.c:539:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		core_widthG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:545:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		core_heightG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:551:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		core_xstartG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:556:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		core_ystartG = atoi( tokens[1] ) ;
data/graywolf-0.1.6/src/twsc/readpar.c:570:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		randomSeedG = (UNSIGNED_INT) atoi( tokens[1] ) ; 
data/graywolf-0.1.6/src/twsc/readpar.c:596:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		route2actG = atoi( tokens[1] ) ; 
data/graywolf-0.1.6/src/twsc/readpar.c:646:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		min_pad_spacingG = atoi( tokens[1] );
data/graywolf-0.1.6/src/twsc/reconfig.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[LRECL] ;    /* name of the file */
data/graywolf-0.1.6/src/twsc/reconfig.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[LRECL] ;      /* read string into buffer */
data/graywolf-0.1.6/src/twsc/reconfig.c:242:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	row = atoi( tokens[0] ) ;
data/graywolf-0.1.6/src/twsc/reconfig.c:245:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    if( atoi(tokens[5]) == 0 && atoi(tokens[6]) == 0 ){
data/graywolf-0.1.6/src/twsc/reconfig.c:245:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    if( atoi(tokens[5]) == 0 && atoi(tokens[6]) == 0 ){
data/graywolf-0.1.6/src/twsc/reconfig.c:306:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    row_in_pl1 = atoi( tokens[6] ) ;
data/graywolf-0.1.6/src/twsc/reconfig.c:346:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( YmsgG, "\trow:%4d num explicit feeds:%d\n",
data/graywolf-0.1.6/src/twsc/savewolf.c:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[64] ;
data/graywolf-0.1.6/src/twsc/savewolf.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file1[1024], file2[1024];
data/graywolf-0.1.6/src/twsc/savewolf.c:204:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( YmsgG, "Wrong number of cells in restart file:%d vs %d in cell file.\n",
data/graywolf-0.1.6/src/twsc/seagate.c:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[128], *pin_name, *eqpin_name ;
data/graywolf-0.1.6/src/twsc/uloop.c:764:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"%3d: %6.2le %6ld %-8ld %-6ld %-8ld",
data/graywolf-0.1.6/src/twsc/uloop.c:768:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"%3d: %6.2le %6ld %-8ld %-6ld %-8ld",
data/graywolf-0.1.6/src/twsc/uloop.c:772:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"%6ld %4.2lf %4.2lf %5.2lf %5.2lf ",
data/graywolf-0.1.6/src/twsc/uloop.c:781:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"%4.2lf %4.2lf %5.3lf %4.2lf\n",
data/graywolf-0.1.6/src/twsc/uloop.c:787:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"%4.2lf %4.2lf %5.3lf\n",
data/graywolf-0.1.6/src/twsc/unlap.c:126:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    Yquicksort( (char *) ( pairArrayG[block] + 1 ) , 
data/graywolf-0.1.6/src/twsc/utemp.c:169:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(YmsgG,"evening the row lengths %d\n",
data/graywolf-0.1.6/src/twsc/utemp.c:186:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( YmsgG, "\nTOTAL INTERCONNECT LENGTH: %d\n",funccostG);
data/graywolf-0.1.6/src/twsc/utemp.c:188:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"initialRowControl:%8.3f\n", initialRowControlG);
data/graywolf-0.1.6/src/twsc/utemp.c:190:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(YmsgG,"finalRowControl:%8.3f\n", finalRowControlG);
data/graywolf-0.1.6/src/twsc/utemp.c:233:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"FINAL TOTAL INTERCONNECT LENGTH: %d\n",funccostG);
data/graywolf-0.1.6/src/twsc/utemp.c:235:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"FINAL OVERLAP PENALTY: %d    ", penaltyG );
data/graywolf-0.1.6/src/twsc/utemp.c:237:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG, "FINAL VALUE OF TOTAL COST IS: %d\n", 
data/graywolf-0.1.6/src/twsc/utemp.c:240:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(YmsgG,"MAX NUMBER OF ATTEMPTED FLIPS PER T:%8d\n",attmaxG);
data/graywolf-0.1.6/src/twsc/utemp.c:256:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"%3d: %6.2le %6ld %-8ld %-6ld %-6ld",
data/graywolf-0.1.6/src/twsc/utemp.c:259:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"%6ld %4.2lf %4.2lf %5.2lf %4.2lf %4.2lf %4.2lf %5.3lf\n",
data/graywolf-0.1.6/src/twsc/utemp.c:292:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"%3d: %6.2le %6ld %-8ld %-6ld %-8ld",
data/graywolf-0.1.6/src/twsc/utemp.c:295:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(YmsgG,"%6ld %4.2lf %4.2lf %5.2lf %5.2lf %4.2lf %4.2lf %5.3lf\n",
data/graywolf-0.1.6/src/twsc/utemp.c:457:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( YmsgG, "cell:%d pinlist is null\n", cell ) ;
data/graywolf-0.1.6/src/twsc/utemp.c:799:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(YmsgG,"\nActually added %d gate array spacers\n",
data/graywolf-0.1.6/include/yalecad/string.h:45:14:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
extern char *strncat( P3( char *str1, char *str2, INT n ) ) ; 
data/graywolf-0.1.6/include/yalecad/string.h:47:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
extern char *strncpy( P3( char *str1, char *str2, INT n) ) ; 
data/graywolf-0.1.6/include/yalecad/string.h:53:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
extern unsigned int  strlen( P1( char *str) ) ; 
data/graywolf-0.1.6/src/Ylib/dialog.c:420:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:449:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:458:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:465:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:602:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:608:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:618:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:622:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    dptr->string, strlen(dptr->string)) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:695:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dataCount = strlen( dptr->string ) ;
data/graywolf-0.1.6/src/Ylib/dialog.c:743:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    dataCount += strlen( buffer ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1274:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1276:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1345:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(label) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1350:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2-width)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1352:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2-width)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1479:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    len = strlen(label) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1493:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2-width)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1495:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(x1+x2-width)/2, (y1+y2)/2, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:1968:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen( string ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2005:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		x, y, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2007:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		x, y, label, strlen(label) ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2195:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nitems = (UNSIGNED_INT) ( strlen( label ) + 1 ) ;
data/graywolf-0.1.6/src/Ylib/draw.c:2251:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nitems = (UNSIGNED_INT) ( strlen( label ) + 1 ) ;
data/graywolf-0.1.6/src/Ylib/graph.c:3138:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    getchar();
data/graywolf-0.1.6/src/Ylib/graph.c:3196:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    getchar();
data/graywolf-0.1.6/src/Ylib/graph.c:3269:5:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    getchar();
data/graywolf-0.1.6/src/Ylib/graph.c:3345:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  data->len = strlen(string) + 1 ;
data/graywolf-0.1.6/src/Ylib/hash.c:146:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(key) ;
data/graywolf-0.1.6/src/Ylib/hash.c:244:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(key) ;
data/graywolf-0.1.6/src/Ylib/list.c:802:15:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((c = getchar()) != EOF) {
data/graywolf-0.1.6/src/Ylib/menus.c:389:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (unsigned char *) windowIdString, strlen(windowIdString) ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:392:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    (unsigned char *) windowIdString, strlen(windowIdString) ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:396:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strlen(windowIdString) ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:449:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    length = strlen( mptr->item ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:461:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    length  = strlen( mptr->item ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:467:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length  = strlen( mptr->bool_item ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:545:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    length = strlen( mptr->item ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:559:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length  = strlen( mptr->bool_item ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1122:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    POS+fwidth,MENUYPOS,message,strlen(message));
data/graywolf-0.1.6/src/Ylib/menus.c:1150:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strwidth = XTextWidth( fontinfoS, directions, strlen(directions)) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1192:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    dataCount += strlen( buffer ) ;
data/graywolf-0.1.6/src/Ylib/menus.c:1733:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen( sptr ) ;
data/graywolf-0.1.6/src/Ylib/okmalloc.c:522:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( alloc_name ) ;
data/graywolf-0.1.6/src/Ylib/path.c:106:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( temp, "/" ) ;
data/graywolf-0.1.6/src/Ylib/path.c:146:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( cur_dir, "/" ) ;
data/graywolf-0.1.6/src/Ylib/radixsort.c:588:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen( buffer + 4 ) + 4 + 1 ;
data/graywolf-0.1.6/src/Ylib/rbtree.c:1250:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    data->str_len = strlen(string) + 1 ;
data/graywolf-0.1.6/src/Ylib/relpath.c:102:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( known_fpath, "/" ) ;
data/graywolf-0.1.6/src/Ylib/string.c:77:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    return( (char *) strcpy( YMALLOC(strlen(str)+1, char), str ) ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:289:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nitems = (UNSIGNED_INT) ( strlen( label ) + 1 ) ;
data/graywolf-0.1.6/src/Ylib/wgraphics.c:327:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nitems = (UNSIGNED_INT) ( strlen( label ) + 1 ) ;
data/graywolf-0.1.6/src/date/getdate.c:80:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen( date ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1632:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dialogS[TILEF].len = strlen( tileName ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1635:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dialogS[LEFTF].len = strlen( left ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1638:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dialogS[BOTF].len = strlen( bottom ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1641:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dialogS[RITEF].len = strlen( right ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1644:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dialogS[TOPF].len = strlen( top ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1870:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    row_dialogS[LEFT_F].len = strlen(left) ;
data/graywolf-0.1.6/src/genrows/draw.c:1873:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    row_dialogS[BOT_F].len = strlen(bottom) ;
data/graywolf-0.1.6/src/genrows/draw.c:1876:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    row_dialogS[RITE_F].len = strlen(right) ;
data/graywolf-0.1.6/src/genrows/draw.c:1879:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    row_dialogS[TOP_F].len = strlen(top) ;
data/graywolf-0.1.6/src/genrows/draw.c:1884:2:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
	sprintf( class, "1" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1967:2:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
	sprintf( answer[DELTAXF].string, "0" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:1974:2:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
	sprintf( answer[DELTAYF].string, "0" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2002:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf( deltax,"0" ) ;
data/graywolf-0.1.6/src/genrows/draw.c:2004:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf( deltay,"0" ) ;
data/graywolf-0.1.6/src/genrows/genrows.c:1203:22:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    INT horiz_line , mismatch , overlap ;
data/graywolf-0.1.6/src/genrows/genrows.c:1312:7:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		if( mismatch < 0 ) {
data/graywolf-0.1.6/src/genrows/genrows.c:1314:24:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			actual_row_height + mismatch ;
data/graywolf-0.1.6/src/genrows/genrows.c:1316:21:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		    horiz_line += mismatch ;
data/graywolf-0.1.6/src/mc_compact/readcgraph.c:399:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat( err_msg, "\n" ) ;
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:12:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/mc_compact/readcgraph_l.h:171:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/mc_compact/readtiles.c:390:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat( err_msg, "\n" ) ;
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:12:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/mc_compact/readtiles_l.h:170:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/mincut/readcells_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/mincut/readcells_l.h:216:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/syntax/output.c:248:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    numsides = strlen( side ) ;
data/graywolf-0.1.6/src/syntax/readcells_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/syntax/readcells_l.h:216:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/twflow/io.c:264:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen( file ) - 1 ;
data/graywolf-0.1.6/src/twflow/program.c:101:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( command, " " ) ;
data/graywolf-0.1.6/src/twflow/readobjects_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/twflow/readobjects_l.h:165:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/twmc/fixcell.c:515:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( left_not_right, "L" ) ;
data/graywolf-0.1.6/src/twmc/fixcell.c:517:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( left_not_right, "R" ) ;
data/graywolf-0.1.6/src/twmc/fixcell.c:522:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( bottom_not_top, "B" ) ;
data/graywolf-0.1.6/src/twmc/fixcell.c:524:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( bottom_not_top, "T" ) ;
data/graywolf-0.1.6/src/twmc/initialize.c:1548:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    numsides = strlen( side ) ;
data/graywolf-0.1.6/src/twmc/main.c:657:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "o" ) ;
data/graywolf-0.1.6/src/twmc/main.c:660:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "d" ) ;
data/graywolf-0.1.6/src/twmc/main.c:663:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "v" ) ;
data/graywolf-0.1.6/src/twmc/main.c:666:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "q" ) ;
data/graywolf-0.1.6/src/twmc/main.c:673:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat( arguments, "w" ) ;
data/graywolf-0.1.6/src/twmc/main.c:676:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "b" ) ;
data/graywolf-0.1.6/src/twmc/main.c:678:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat( arguments, "n" ) ;
data/graywolf-0.1.6/src/twmc/main.c:680:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat( arguments, " " ) ;
data/graywolf-0.1.6/src/twmc/outpin.c:315:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen( pinname ) ;
data/graywolf-0.1.6/src/twmc/outpin.c:337:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen( pinname ) ;
data/graywolf-0.1.6/src/twmc/output.c:598:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twmc/output.c:617:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twmc/readcells_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/twmc/readcells_l.h:199:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/twmc/readnets_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/twmc/readnets_l.h:177:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/twmc/readpar.c:183:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen( cktNameG ) ;
data/graywolf-0.1.6/src/twsc/cell_width.c:596:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    delta = - strlen(copyBuf) ;
data/graywolf-0.1.6/src/twsc/main.c:874:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strlen( netptr->pinname ) + 1 ) * 
data/graywolf-0.1.6/src/twsc/main.c:877:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strlen( netptr->eqptr->pinname ) + 1 ) * 
data/graywolf-0.1.6/src/twsc/outpins.c:415:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:426:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:477:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:488:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:607:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( tmp_char , tmp_pinname + 1 , 1 ) ;
data/graywolf-0.1.6/src/twsc/outpins.c:625:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:636:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:690:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:701:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:755:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:766:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:841:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins.c:852:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:397:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:408:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:659:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:670:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:725:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:736:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:791:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:802:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:872:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_pinname ) ) {
data/graywolf-0.1.6/src/twsc/outpins1.c:883:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/output.c:176:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    cellptr->cname, (strlen(cellptr->cname)+3) *
data/graywolf-0.1.6/src/twsc/output.c:197:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/output.c:265:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( length < strlen( tmp_name ) ) {
data/graywolf-0.1.6/src/twsc/output.c:461:1:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
strcpy( fixed_string , "" ) ;
data/graywolf-0.1.6/src/twsc/output.c:487:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		    strcpy( fixed_string , "" ) ;
data/graywolf-0.1.6/src/twsc/output.c:532:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
if( (int) (tmp = fgetc(fp)) != EOF ) {
data/graywolf-0.1.6/src/twsc/output.c:536:23:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while( (a_lineS[i] = fgetc(fp)) != '\n' ) {
data/graywolf-0.1.6/src/twsc/parser.c:630:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen( pin_name ) + 3 ) * sizeof( char ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:645:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (strlen(pin_name) + 3 ) * sizeof( char ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:801:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen( pin_name ) + 3 ) * sizeof( char ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:943:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(strlen(equiv_name) + 3 ) * sizeof( char ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:958:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    (strlen(equiv_name) + 3 ) * sizeof(char));
data/graywolf-0.1.6/src/twsc/parser.c:962:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    (strlen(equiv_name) + 1 ) * sizeof(char));
data/graywolf-0.1.6/src/twsc/parser.c:972:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    (strlen( equiv_name ) + 3 ) * sizeof( char ) ) ;
data/graywolf-0.1.6/src/twsc/parser.c:1963:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	numsides = strlen( padside ) ;
data/graywolf-0.1.6/src/twsc/readcell.c:813:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat( err_msg, "\n" ) ;
data/graywolf-0.1.6/src/twsc/readcell_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/twsc/readcell_l.h:205:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){
data/graywolf-0.1.6/src/twsc/readnets.c:655:14:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
             strcat( err_msg, "\n" ) ;
data/graywolf-0.1.6/src/twsc/readnets_l.h:11:56:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define input() (((yytchar=yysptr>yysbuf?U(*--yysptr):getc(yyin))==10?(yylineno++,yytchar):yytchar)==EOF?0:yytchar)
data/graywolf-0.1.6/src/twsc/readnets_l.h:164:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) >= YYLMAX ){

ANALYSIS SUMMARY:

Hits = 1622
Lines analyzed = 121373 in approximately 3.57 seconds (34041 lines/second)
Physical Source Lines of Code (SLOC) = 84365
Hits@level = [0] 1713 [1] 157 [2] 773 [3]  34 [4] 657 [5]   1
Hits@level+ = [0+] 3335 [1+] 1622 [2+] 1465 [3+] 692 [4+] 658 [5+]   1
Hits/KSLOC@level+ = [0+] 39.5306 [1+] 19.226 [2+] 17.365 [3+] 8.20245 [4+] 7.79944 [5+] 0.0118533
Symlinks skipped = 1 (--allowlink overrides but see doc for security issue)
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.