Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/voidptr.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/objmap.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/array.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/int_convertors.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/array.h
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/descriptors.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/bool.cpp
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/threads.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/sipint.h
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/voidptr.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/objmap.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/array.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/int_convertors.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/array.h
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/descriptors.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/bool.cpp
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/threads.c
Examining data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/sipint.h
Examining data/sip5-5.5.0+dfsg/code_generator/heap.c
Examining data/sip5-5.5.0+dfsg/code_generator/transform.c
Examining data/sip5-5.5.0+dfsg/code_generator/gencode.c
Examining data/sip5-5.5.0+dfsg/code_generator/extracts.c
Examining data/sip5-5.5.0+dfsg/code_generator/sip.h
Examining data/sip5-5.5.0+dfsg/code_generator/export.c
Examining data/sip5-5.5.0+dfsg/code_generator/pybinding.c
Examining data/sip5-5.5.0+dfsg/code_generator/type_hints.c

FINAL RESULTS:

data/sip5-5.5.0+dfsg/code_generator/heap.c:103:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(new,sp);
data/sip5-5.5.0+dfsg/code_generator/heap.c:120:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(*s,new);
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:448:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(&error_text[used], room, fmt, ap);
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:466:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(&error_text[used], room, fmt, ap);
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:508:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(&warning_text[used], room, fmt, ap);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3191:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(new_vname + pos + 1, cp + 2);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3207:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(new_dst + (cp - dst) + value_len, cp + name_len);
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:594:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fp, (cd == NULL) ? ") -> None: ...\n" : ")");
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:919:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(fp, ad->defval->u.vnum ? "True" : "False");
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:968:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(fp, anyObject(pep484));
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:1195:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(fp, (indent ? "\n" : "\n\n"));
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c:238:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(api_copy, api);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:550:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(d,s);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:622:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(&sp -> name[1],meth);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:1260:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, ap);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c:238:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(api_copy, api);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:550:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(d,s);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:622:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(&sp -> name[1],meth);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:1266:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, ap);
data/sip5-5.5.0+dfsg/code_generator/export.c:84:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(apiFile, "w")) == NULL)
data/sip5-5.5.0+dfsg/code_generator/export.c:294:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(xmlFile, "w")) == NULL)
data/sip5-5.5.0+dfsg/code_generator/extracts.c:58:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fp = fopen(fname, "w")) == NULL)
data/sip5-5.5.0+dfsg/code_generator/gencode.c:953:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[50];
data/sip5-5.5.0+dfsg/code_generator/gencode.c:955:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "part%d", part);
data/sip5-5.5.0+dfsg/code_generator/gencode.c:3609:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[50];
data/sip5-5.5.0+dfsg/code_generator/gencode.c:3611:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "_%d", iff->api_range->index);
data/sip5-5.5.0+dfsg/code_generator/gencode.c:8672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[50];
data/sip5-5.5.0+dfsg/code_generator/gencode.c:8689:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(buf, "a%d", a);
data/sip5-5.5.0+dfsg/code_generator/gencode.c:11129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vnamebuf[50];
data/sip5-5.5.0+dfsg/code_generator/gencode.c:11318:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(vnamebuf, "a%d", only);
data/sip5-5.5.0+dfsg/code_generator/gencode.c:13123:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char fmt[3];
data/sip5-5.5.0+dfsg/code_generator/gencode.c:13350:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname, "w")) == NULL)
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char error_text[1000];
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:501:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char warning_text[1000];
data/sip5-5.5.0+dfsg/code_generator/transform.c:3189:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(new_vname, vname, pos);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3205:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(new_dst, dst, cp - dst);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3206:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(new_dst + (cp - dst), vname, value_len);
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:101:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(pyiFile, "w")) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:7709:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:7716:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/sip5-5.5.0+dfsg/code_generator/extracts.c:51:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(ed->id) == id_len && strncmp(ed->id, id, id_len) == 0)
data/sip5-5.5.0+dfsg/code_generator/heap.c:91:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen(sp);
data/sip5-5.5.0+dfsg/code_generator/heap.c:117:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((*s = realloc(*s,strlen(*s) + strlen(new) + 1)) == NULL)
data/sip5-5.5.0+dfsg/code_generator/heap.c:117:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((*s = realloc(*s,strlen(*s) + strlen(new) + 1)) == NULL)
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:444:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t used = strlen(error_text);
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:462:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t used = strlen(error_text);
data/sip5-5.5.0+dfsg/code_generator/pybinding.c:504:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t used = strlen(warning_text);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3180:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_len = strlen(names->name);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3181:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        value_len = strlen(vname);
data/sip5-5.5.0+dfsg/code_generator/transform.c:3203:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char *new_dst = sipMalloc(strlen(dst) - name_len + value_len + 1);
data/sip5-5.5.0+dfsg/code_generator/type_hints.c:1427:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                thd->raw_hint + strlen(thd->raw_hint), &thd->root);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/apiversions.c:235:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((api_copy = sip_api_malloc(strlen(api) + 1)) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:549:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((d = (char *)sip_api_malloc(strlen(s) + 1)) != NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/qtlib.c:614:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((sp -> name = (char *)sip_api_malloc(strlen(meth) + 2)) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2234:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((args = PyTuple_New(strlen(fmt))) != NULL && buildObject(args, fmt, va) != NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2263:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((args = PyTuple_New(strlen(fmt))) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2356:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (strlen(fmt) == 1)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:2583:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    el = PyUnicode_FromWideChar(s, (Py_ssize_t)wcslen(s));
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8124:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            w = PyUnicode_DecodeASCII(si->si_val, strlen(si->si_val), NULL);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8128:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            w = PyUnicode_DecodeLatin1(si->si_val, strlen(si->si_val), NULL);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.7/siplib.c:8149:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    wcslen((const wchar_t *)si->si_val));
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/apiversions.c:235:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((api_copy = sip_api_malloc(strlen(api) + 1)) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:549:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((d = (char *)sip_api_malloc(strlen(s) + 1)) != NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/qtlib.c:614:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((sp -> name = (char *)sip_api_malloc(strlen(meth) + 2)) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2240:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((args = PyTuple_New(strlen(fmt))) != NULL && buildObject(args, fmt, va) != NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2269:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((args = PyTuple_New(strlen(fmt))) == NULL)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2362:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (strlen(fmt) == 1)
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:2589:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    el = PyUnicode_FromWideChar(s, (Py_ssize_t)wcslen(s));
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8131:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            w = PyUnicode_DecodeASCII(si->si_val, strlen(si->si_val), NULL);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8135:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            w = PyUnicode_DecodeLatin1(si->si_val, strlen(si->si_val), NULL);
data/sip5-5.5.0+dfsg/sipbuild/module/source/12.8/siplib.c:8156:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    wcslen((const wchar_t *)si->si_val));

ANALYSIS SUMMARY:

Hits = 71
Lines analyzed = 59675 in approximately 1.19 seconds (50087 lines/second)
Physical Source Lines of Code (SLOC) = 39515
Hits@level = [0] 214 [1]  31 [2]  21 [3]   0 [4]  19 [5]   0
Hits@level+ = [0+] 285 [1+]  71 [2+]  40 [3+]  19 [4+]  19 [5+]   0
Hits/KSLOC@level+ = [0+] 7.21245 [1+] 1.79679 [2+] 1.01227 [3+] 0.48083 [4+] 0.48083 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.