Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/pybik-3.0/csrc/_qt_qtwes2.cpp Examining data/pybik-3.0/csrc/_qtui__moc.cpp Examining data/pybik-3.0/csrc/_qtui__moc.h Examining data/pybik-3.0/csrc/about.h Examining data/pybik-3.0/csrc/_qtexec_.cpp Examining data/pybik-3.0/csrc/_qt_qtwes2_moc.h Examining data/pybik-3.0/csrc/_gldraw_ogl.c Examining data/pybik-3.0/csrc/_gldraw_es2.c Examining data/pybik-3.0/csrc/_qtui_.cpp Examining data/pybik-3.0/csrc/_glarea_es2.c Examining data/pybik-3.0/csrc/main.h Examining data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp Examining data/pybik-3.0/csrc/_qt_qtwogl_priv.cpp Examining data/pybik-3.0/csrc/_qt_qtwes2_priv.cpp Examining data/pybik-3.0/csrc/_qtui__priv.cpp Examining data/pybik-3.0/csrc/qtui_p.h Examining data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp Examining data/pybik-3.0/csrc/help.h Examining data/pybik-3.0/csrc/preferences.h Examining data/pybik-3.0/csrc/_glarea_ogl.c Examining data/pybik-3.0/csrc/_qt_qtwogl_moc.h Examining data/pybik-3.0/csrc/_qt_qtwogl.cpp Examining data/pybik-3.0/pybiklib/ext/qtui_p.h FINAL RESULTS: data/pybik-3.0/csrc/_glarea_es2.c:601:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_glarea_es2.c:6957:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %s\n"), __pyx_v_msg, ((char *)glGetString(__pyx_v_name))); data/pybik-3.0/csrc/_glarea_es2.c:6997:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %f\n"), __pyx_v_msg, __pyx_v_i); data/pybik-3.0/csrc/_glarea_es2.c:7037:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %d\n"), __pyx_v_msg, __pyx_v_i); data/pybik-3.0/csrc/_glarea_es2.c:7077:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %d\n"), __pyx_v_msg, ((int)__pyx_v_i)); data/pybik-3.0/csrc/_glarea_es2.c:8944:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s"), __pyx_v_log); data/pybik-3.0/csrc/_glarea_es2.c:9046:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s"), __pyx_v_log); data/pybik-3.0/csrc/_glarea_es2.c:9205:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"GL_INFO_LOG_LENGTH %d\n"), __pyx_v_compile_status); data/pybik-3.0/csrc/_glarea_es2.c:9393:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"shader program info %d\n"), __pyx_v_program); data/pybik-3.0/csrc/_glarea_es2.c:9411:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" delete status %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_DELETE_STATUS)); data/pybik-3.0/csrc/_glarea_es2.c:9429:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" link status %d\n"), __pyx_v_link_status); data/pybik-3.0/csrc/_glarea_es2.c:9438:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" validate status %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_VALIDATE_STATUS)); data/pybik-3.0/csrc/_glarea_es2.c:9456:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" info log length %d\n"), __pyx_v_info_log_length); data/pybik-3.0/csrc/_glarea_es2.c:9465:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" attached shaders %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_ATTACHED_SHADERS)); data/pybik-3.0/csrc/_glarea_es2.c:9483:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" active attribute max length %d\n"), __pyx_v_aaml); data/pybik-3.0/csrc/_glarea_es2.c:9501:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" active uniform max length %d\n"), __pyx_v_auml); data/pybik-3.0/csrc/_glarea_es2.c:9519:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"active attributes %d:\n"), __pyx_v_param); data/pybik-3.0/csrc/_glarea_es2.c:9557:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_aaml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location); data/pybik-3.0/csrc/_glarea_es2.c:9576:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"active uniforms %d:\n"), __pyx_v_param); data/pybik-3.0/csrc/_glarea_es2.c:9614:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_auml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location); data/pybik-3.0/csrc/_glarea_es2.c:9863:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"link status %d\n"), __pyx_v_link_status); data/pybik-3.0/csrc/_glarea_ogl.c:602:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_glarea_ogl.c:6928:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %s\n"), __pyx_v_msg, ((char *)glGetString(__pyx_v_name))); data/pybik-3.0/csrc/_glarea_ogl.c:6968:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %f\n"), __pyx_v_msg, __pyx_v_i); data/pybik-3.0/csrc/_glarea_ogl.c:7008:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %d\n"), __pyx_v_msg, __pyx_v_i); data/pybik-3.0/csrc/_glarea_ogl.c:7048:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s %d\n"), __pyx_v_msg, ((int)__pyx_v_i)); data/pybik-3.0/csrc/_glarea_ogl.c:7170:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" GL_MULTISAMPLE: %d\n"), glIsEnabled(GL_MULTISAMPLE)); data/pybik-3.0/csrc/_glarea_ogl.c:8974:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s"), __pyx_v_log); data/pybik-3.0/csrc/_glarea_ogl.c:9076:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"%s"), __pyx_v_log); data/pybik-3.0/csrc/_glarea_ogl.c:9235:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"GL_INFO_LOG_LENGTH %d\n"), __pyx_v_compile_status); data/pybik-3.0/csrc/_glarea_ogl.c:9423:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"shader program info %d\n"), __pyx_v_program); data/pybik-3.0/csrc/_glarea_ogl.c:9441:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" delete status %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_DELETE_STATUS)); data/pybik-3.0/csrc/_glarea_ogl.c:9459:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" link status %d\n"), __pyx_v_link_status); data/pybik-3.0/csrc/_glarea_ogl.c:9468:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" validate status %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_VALIDATE_STATUS)); data/pybik-3.0/csrc/_glarea_ogl.c:9486:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" info log length %d\n"), __pyx_v_info_log_length); data/pybik-3.0/csrc/_glarea_ogl.c:9495:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" attached shaders %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_ATTACHED_SHADERS)); data/pybik-3.0/csrc/_glarea_ogl.c:9513:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" active attribute max length %d\n"), __pyx_v_aaml); data/pybik-3.0/csrc/_glarea_ogl.c:9531:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" active uniform max length %d\n"), __pyx_v_auml); data/pybik-3.0/csrc/_glarea_ogl.c:9549:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"active attributes %d:\n"), __pyx_v_param); data/pybik-3.0/csrc/_glarea_ogl.c:9587:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_aaml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location); data/pybik-3.0/csrc/_glarea_ogl.c:9606:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"active uniforms %d:\n"), __pyx_v_param); data/pybik-3.0/csrc/_glarea_ogl.c:9644:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_auml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location); data/pybik-3.0/csrc/_glarea_ogl.c:9893:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"link status %d\n"), __pyx_v_link_status); data/pybik-3.0/csrc/_gldraw_es2.c:598:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_gldraw_ogl.c:599:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_qt_qtwes2.cpp:684:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_qt_qtwes2.cpp:4423:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"GL%05x: %s\n"), __pyx_v_msg.id(), __pyx_v_msg.message().toUtf8().data()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5395:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"QOpenGLDebugLogger successfully initialized and started (%d initial messages)\n"), __pyx_v_messages.size()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5457:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %s: %d"), __pyx_v_name, __pyx_v_f); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5468:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" (%d)"), __pyx_v_rf); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5480:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" [%d]"), __pyx_v_df); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5522:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %s: %d.%d"), __pyx_v_name, __pyx_v_f1, __pyx_v_f2); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5541:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" (%d.%d)"), __pyx_v_rf1, __pyx_v_rf2); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5561:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" [%d.%d]"), __pyx_v_df1, __pyx_v_df2); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5856:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" unknown module type: %d\n"), __pyx_v_i); data/pybik-3.0/csrc/_qt_qtwes2.cpp:5976:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" features: 0x%0x\n"), __pyx_v_features); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6380:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"==== %s\n"), __pyx_v_msg); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6389:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Class-Name: %s\n"), __pyx_v_mo->className()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6408:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Properties: %d (%d inherited)\n"), __pyx_v_mo->propertyCount(), __pyx_v_mo->propertyOffset()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6437:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %s %s\n"), __pyx_v_i, __pyx_v_p.typeName(), __pyx_v_p.name()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6466:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Methods: %d (%d inherited)\n"), __pyx_v_mo->methodCount(), __pyx_v_mo->methodOffset()); data/pybik-3.0/csrc/_qt_qtwes2.cpp:6495:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %s %s\n"), __pyx_v_i, __pyx_v_m.typeName(), __pyx_v_m.methodSignature().data()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:685:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_qt_qtwogl.cpp:4424:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"GL%05x: %s\n"), __pyx_v_msg.id(), __pyx_v_msg.message().toUtf8().data()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5396:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"QOpenGLDebugLogger successfully initialized and started (%d initial messages)\n"), __pyx_v_messages.size()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5458:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %s: %d"), __pyx_v_name, __pyx_v_f); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5469:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" (%d)"), __pyx_v_rf); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5481:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" [%d]"), __pyx_v_df); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5523:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %s: %d.%d"), __pyx_v_name, __pyx_v_f1, __pyx_v_f2); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5542:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" (%d.%d)"), __pyx_v_rf1, __pyx_v_rf2); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5562:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" [%d.%d]"), __pyx_v_df1, __pyx_v_df2); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5857:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" unknown module type: %d\n"), __pyx_v_i); data/pybik-3.0/csrc/_qt_qtwogl.cpp:5977:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" features: 0x%0x\n"), __pyx_v_features); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6372:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"==== %s\n"), __pyx_v_msg); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6381:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Class-Name: %s\n"), __pyx_v_mo->className()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6400:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Properties: %d (%d inherited)\n"), __pyx_v_mo->propertyCount(), __pyx_v_mo->propertyOffset()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6429:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %s %s\n"), __pyx_v_i, __pyx_v_p.typeName(), __pyx_v_p.name()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6458:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)"Methods: %d (%d inherited)\n"), __pyx_v_mo->methodCount(), __pyx_v_mo->methodOffset()); data/pybik-3.0/csrc/_qt_qtwogl.cpp:6487:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(((char const *)" %d %s %s\n"), __pyx_v_i, __pyx_v_m.typeName(), __pyx_v_m.methodSignature().data()); data/pybik-3.0/csrc/_qtexec_.cpp:681:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_qtexec_.cpp:2440:48: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. __pyx_t_4 = __pyx_f_8_qtexec__q2str(QLocale::system().name()); if (unlikely(!__pyx_t_4)) __PYX_ERR(0, 124, __pyx_L1_error) data/pybik-3.0/csrc/_qtui_.cpp:682:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c); data/pybik-3.0/csrc/_glarea_es2.c:554:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_glarea_es2.c:8115:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __pyx_v_pixel[4]; data/pybik-3.0/csrc/_glarea_es2.c:8897:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_log[0x400]; data/pybik-3.0/csrc/_glarea_es2.c:8999:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_log[0x400]; data/pybik-3.0/csrc/_glarea_es2.c:9380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_aname[0x400]; data/pybik-3.0/csrc/_glarea_es2.c:13241:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_glarea_es2.c:13245:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_glarea_ogl.c:555:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_glarea_ogl.c:8145:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __pyx_v_pixel[4]; data/pybik-3.0/csrc/_glarea_ogl.c:8927:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_log[0x400]; data/pybik-3.0/csrc/_glarea_ogl.c:9029:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_log[0x400]; data/pybik-3.0/csrc/_glarea_ogl.c:9410:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pyx_v_aname[0x400]; data/pybik-3.0/csrc/_glarea_ogl.c:13257:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_glarea_ogl.c:13261:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_gldraw_es2.c:551:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_gldraw_es2.c:3806:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_gldraw_es2.c:3810:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_gldraw_ogl.c:552:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_gldraw_ogl.c:3807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_gldraw_ogl.c:3811:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_qt_qtwes2.cpp:637:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_qt_qtwes2.cpp:30136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_qt_qtwes2.cpp:30140:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:23:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[111]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[70]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:374:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[47]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:557:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[105]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:796:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[995]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1056:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[27]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[12]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[909]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1430:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[11]; data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1498:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[127]; data/pybik-3.0/csrc/_qt_qtwogl.cpp:638:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_qt_qtwogl.cpp:30128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_qt_qtwogl.cpp:30132:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:23:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[111]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[70]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:374:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[47]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:557:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[105]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:796:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[995]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1056:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[27]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[12]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[909]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1430:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[11]; data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1498:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[127]; data/pybik-3.0/csrc/_qtexec_.cpp:634:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_qtexec_.cpp:4796:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_qtexec_.cpp:4800:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_qtui_.cpp:635:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii_chars[128]; data/pybik-3.0/csrc/_qtui_.cpp:4193:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctversion[4], rtversion[4]; data/pybik-3.0/csrc/_qtui_.cpp:4197:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[200]; data/pybik-3.0/csrc/_qtui__moc.cpp:23:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[28]; data/pybik-3.0/csrc/_qtui__moc.cpp:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringdata0[40]; data/pybik-3.0/csrc/_glarea_es2.c:485:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_glarea_es2.c:599:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_glarea_es2.c:13396:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_glarea_ogl.c:486:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_glarea_ogl.c:600:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_glarea_ogl.c:13412:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_gldraw_es2.c:482:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_gldraw_es2.c:596:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_gldraw_es2.c:3889:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_gldraw_ogl.c:483:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_gldraw_ogl.c:597:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_gldraw_ogl.c:3890:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_qt_qtwes2.cpp:568:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_qt_qtwes2.cpp:682:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_qt_qtwes2.cpp:26888:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(cstring); data/pybik-3.0/csrc/_qt_qtwes2.cpp:30254:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_qt_qtwogl.cpp:569:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_qt_qtwogl.cpp:683:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_qt_qtwogl.cpp:26880:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(cstring); data/pybik-3.0/csrc/_qt_qtwogl.cpp:30246:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_qtexec_.cpp:565:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_qtexec_.cpp:679:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_qtexec_.cpp:3628:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(cstring); data/pybik-3.0/csrc/_qtexec_.cpp:4842:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); data/pybik-3.0/csrc/_qtui_.cpp:566:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s)) data/pybik-3.0/csrc/_qtui_.cpp:680:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c)); data/pybik-3.0/csrc/_qtui_.cpp:1313:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __pyx_t_3 = __Pyx_decode_c_string(__pyx_v_text, 0, strlen(__pyx_v_text), NULL, NULL, PyUnicode_DecodeUTF8); if (unlikely(!__pyx_t_3)) __PYX_ERR(0, 796, __pyx_L1_error) data/pybik-3.0/csrc/_qtui_.cpp:3371:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(cstring); data/pybik-3.0/csrc/_qtui_.cpp:4276:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str)); ANALYSIS SUMMARY: Hits = 165 Lines analyzed = 111832 in approximately 3.12 seconds (35899 lines/second) Physical Source Lines of Code (SLOC) = 68897 Hits@level = [0] 0 [1] 29 [2] 54 [3] 0 [4] 82 [5] 0 Hits@level+ = [0+] 165 [1+] 165 [2+] 136 [3+] 82 [4+] 82 [5+] 0 Hits/KSLOC@level+ = [0+] 2.39488 [1+] 2.39488 [2+] 1.97396 [3+] 1.19018 [4+] 1.19018 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.