Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/pybik-3.0/csrc/_qt_qtwes2.cpp
Examining data/pybik-3.0/csrc/_qtui__moc.cpp
Examining data/pybik-3.0/csrc/_qtui__moc.h
Examining data/pybik-3.0/csrc/about.h
Examining data/pybik-3.0/csrc/_qtexec_.cpp
Examining data/pybik-3.0/csrc/_qt_qtwes2_moc.h
Examining data/pybik-3.0/csrc/_gldraw_ogl.c
Examining data/pybik-3.0/csrc/_gldraw_es2.c
Examining data/pybik-3.0/csrc/_qtui_.cpp
Examining data/pybik-3.0/csrc/_glarea_es2.c
Examining data/pybik-3.0/csrc/main.h
Examining data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp
Examining data/pybik-3.0/csrc/_qt_qtwogl_priv.cpp
Examining data/pybik-3.0/csrc/_qt_qtwes2_priv.cpp
Examining data/pybik-3.0/csrc/_qtui__priv.cpp
Examining data/pybik-3.0/csrc/qtui_p.h
Examining data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp
Examining data/pybik-3.0/csrc/help.h
Examining data/pybik-3.0/csrc/preferences.h
Examining data/pybik-3.0/csrc/_glarea_ogl.c
Examining data/pybik-3.0/csrc/_qt_qtwogl_moc.h
Examining data/pybik-3.0/csrc/_qt_qtwogl.cpp
Examining data/pybik-3.0/pybiklib/ext/qtui_p.h

FINAL RESULTS:

data/pybik-3.0/csrc/_glarea_es2.c:601:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_glarea_es2.c:6957:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %s\n"), __pyx_v_msg, ((char *)glGetString(__pyx_v_name)));
data/pybik-3.0/csrc/_glarea_es2.c:6997:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %f\n"), __pyx_v_msg, __pyx_v_i);
data/pybik-3.0/csrc/_glarea_es2.c:7037:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %d\n"), __pyx_v_msg, __pyx_v_i);
data/pybik-3.0/csrc/_glarea_es2.c:7077:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %d\n"), __pyx_v_msg, ((int)__pyx_v_i));
data/pybik-3.0/csrc/_glarea_es2.c:8944:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"%s"), __pyx_v_log);
data/pybik-3.0/csrc/_glarea_es2.c:9046:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"%s"), __pyx_v_log);
data/pybik-3.0/csrc/_glarea_es2.c:9205:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"GL_INFO_LOG_LENGTH %d\n"), __pyx_v_compile_status);
data/pybik-3.0/csrc/_glarea_es2.c:9393:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"shader program info %d\n"), __pyx_v_program);
data/pybik-3.0/csrc/_glarea_es2.c:9411:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  delete status %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_DELETE_STATUS));
data/pybik-3.0/csrc/_glarea_es2.c:9429:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  link status %d\n"), __pyx_v_link_status);
data/pybik-3.0/csrc/_glarea_es2.c:9438:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  validate status %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_VALIDATE_STATUS));
data/pybik-3.0/csrc/_glarea_es2.c:9456:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  info log length %d\n"), __pyx_v_info_log_length);
data/pybik-3.0/csrc/_glarea_es2.c:9465:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  attached shaders %d\n"), __pyx_f_11_glarea_es2__get_program_iv(__pyx_v_program, GL_ATTACHED_SHADERS));
data/pybik-3.0/csrc/_glarea_es2.c:9483:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  active attribute max length %d\n"), __pyx_v_aaml);
data/pybik-3.0/csrc/_glarea_es2.c:9501:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  active uniform max length %d\n"), __pyx_v_auml);
data/pybik-3.0/csrc/_glarea_es2.c:9519:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"active attributes %d:\n"), __pyx_v_param);
data/pybik-3.0/csrc/_glarea_es2.c:9557:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_aaml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location);
data/pybik-3.0/csrc/_glarea_es2.c:9576:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"active uniforms %d:\n"), __pyx_v_param);
data/pybik-3.0/csrc/_glarea_es2.c:9614:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_auml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location);
data/pybik-3.0/csrc/_glarea_es2.c:9863:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"link status %d\n"), __pyx_v_link_status);
data/pybik-3.0/csrc/_glarea_ogl.c:602:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_glarea_ogl.c:6928:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %s\n"), __pyx_v_msg, ((char *)glGetString(__pyx_v_name)));
data/pybik-3.0/csrc/_glarea_ogl.c:6968:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %f\n"), __pyx_v_msg, __pyx_v_i);
data/pybik-3.0/csrc/_glarea_ogl.c:7008:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %d\n"), __pyx_v_msg, __pyx_v_i);
data/pybik-3.0/csrc/_glarea_ogl.c:7048:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"%s %d\n"), __pyx_v_msg, ((int)__pyx_v_i));
data/pybik-3.0/csrc/_glarea_ogl.c:7170:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  GL_MULTISAMPLE: %d\n"), glIsEnabled(GL_MULTISAMPLE));
data/pybik-3.0/csrc/_glarea_ogl.c:8974:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"%s"), __pyx_v_log);
data/pybik-3.0/csrc/_glarea_ogl.c:9076:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"%s"), __pyx_v_log);
data/pybik-3.0/csrc/_glarea_ogl.c:9235:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"GL_INFO_LOG_LENGTH %d\n"), __pyx_v_compile_status);
data/pybik-3.0/csrc/_glarea_ogl.c:9423:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"shader program info %d\n"), __pyx_v_program);
data/pybik-3.0/csrc/_glarea_ogl.c:9441:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  delete status %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_DELETE_STATUS));
data/pybik-3.0/csrc/_glarea_ogl.c:9459:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  link status %d\n"), __pyx_v_link_status);
data/pybik-3.0/csrc/_glarea_ogl.c:9468:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  validate status %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_VALIDATE_STATUS));
data/pybik-3.0/csrc/_glarea_ogl.c:9486:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  info log length %d\n"), __pyx_v_info_log_length);
data/pybik-3.0/csrc/_glarea_ogl.c:9495:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  attached shaders %d\n"), __pyx_f_11_glarea_ogl__get_program_iv(__pyx_v_program, GL_ATTACHED_SHADERS));
data/pybik-3.0/csrc/_glarea_ogl.c:9513:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  active attribute max length %d\n"), __pyx_v_aaml);
data/pybik-3.0/csrc/_glarea_ogl.c:9531:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  active uniform max length %d\n"), __pyx_v_auml);
data/pybik-3.0/csrc/_glarea_ogl.c:9549:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"active attributes %d:\n"), __pyx_v_param);
data/pybik-3.0/csrc/_glarea_ogl.c:9587:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_aaml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location);
data/pybik-3.0/csrc/_glarea_ogl.c:9606:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"active uniforms %d:\n"), __pyx_v_param);
data/pybik-3.0/csrc/_glarea_ogl.c:9644:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  %d %-*s length=%d size=%d type=%d location=%d\n"), __pyx_v_i, (__pyx_v_auml + 3), __pyx_v_aname, __pyx_v_alength, __pyx_v_asize, __pyx_v_atype, __pyx_v_location);
data/pybik-3.0/csrc/_glarea_ogl.c:9893:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"link status %d\n"), __pyx_v_link_status);
data/pybik-3.0/csrc/_gldraw_es2.c:598:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_gldraw_ogl.c:599:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:684:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:4423:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"GL%05x: %s\n"), __pyx_v_msg.id(), __pyx_v_msg.message().toUtf8().data());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5395:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"QOpenGLDebugLogger successfully initialized and started (%d initial messages)\n"), __pyx_v_messages.size());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5457:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  %s: %d"), __pyx_v_name, __pyx_v_f);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5468:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" (%d)"), __pyx_v_rf);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5480:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" [%d]"), __pyx_v_df);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5522:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  %s: %d.%d"), __pyx_v_name, __pyx_v_f1, __pyx_v_f2);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5541:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" (%d.%d)"), __pyx_v_rf1, __pyx_v_rf2);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5561:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" [%d.%d]"), __pyx_v_df1, __pyx_v_df2);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5856:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  unknown module type: %d\n"), __pyx_v_i);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:5976:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  features: 0x%0x\n"), __pyx_v_features);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6380:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"==== %s\n"), __pyx_v_msg);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6389:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"Class-Name: %s\n"), __pyx_v_mo->className());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6408:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"Properties: %d (%d inherited)\n"), __pyx_v_mo->propertyCount(), __pyx_v_mo->propertyOffset());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6437:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(((char const *)"  %d %s %s\n"), __pyx_v_i, __pyx_v_p.typeName(), __pyx_v_p.name());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6466:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"Methods: %d (%d inherited)\n"), __pyx_v_mo->methodCount(), __pyx_v_mo->methodOffset());
data/pybik-3.0/csrc/_qt_qtwes2.cpp:6495:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(((char const *)"  %d %s %s\n"), __pyx_v_i, __pyx_v_m.typeName(), __pyx_v_m.methodSignature().data());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:685:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:4424:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"GL%05x: %s\n"), __pyx_v_msg.id(), __pyx_v_msg.message().toUtf8().data());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5396:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"QOpenGLDebugLogger successfully initialized and started (%d initial messages)\n"), __pyx_v_messages.size());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5458:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  %s: %d"), __pyx_v_name, __pyx_v_f);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5469:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" (%d)"), __pyx_v_rf);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5481:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" [%d]"), __pyx_v_df);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5523:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  %s: %d.%d"), __pyx_v_name, __pyx_v_f1, __pyx_v_f2);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5542:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" (%d.%d)"), __pyx_v_rf1, __pyx_v_rf2);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5562:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)" [%d.%d]"), __pyx_v_df1, __pyx_v_df2);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5857:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"  unknown module type: %d\n"), __pyx_v_i);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:5977:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"  features: 0x%0x\n"), __pyx_v_features);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6372:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"==== %s\n"), __pyx_v_msg);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6381:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(((char const *)"Class-Name: %s\n"), __pyx_v_mo->className());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6400:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"Properties: %d (%d inherited)\n"), __pyx_v_mo->propertyCount(), __pyx_v_mo->propertyOffset());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6429:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(((char const *)"  %d %s %s\n"), __pyx_v_i, __pyx_v_p.typeName(), __pyx_v_p.name());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6458:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(((char const *)"Methods: %d (%d inherited)\n"), __pyx_v_mo->methodCount(), __pyx_v_mo->methodOffset());
data/pybik-3.0/csrc/_qt_qtwogl.cpp:6487:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(((char const *)"  %d %s %s\n"), __pyx_v_i, __pyx_v_m.typeName(), __pyx_v_m.methodSignature().data());
data/pybik-3.0/csrc/_qtexec_.cpp:681:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_qtexec_.cpp:2440:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  __pyx_t_4 = __pyx_f_8_qtexec__q2str(QLocale::system().name()); if (unlikely(!__pyx_t_4)) __PYX_ERR(0, 124, __pyx_L1_error)
data/pybik-3.0/csrc/_qtui_.cpp:682:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(__PYX_DEFAULT_STRING_ENCODING, default_encoding_c);
data/pybik-3.0/csrc/_glarea_es2.c:554:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_glarea_es2.c:8115:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char __pyx_v_pixel[4];
data/pybik-3.0/csrc/_glarea_es2.c:8897:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_log[0x400];
data/pybik-3.0/csrc/_glarea_es2.c:8999:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_log[0x400];
data/pybik-3.0/csrc/_glarea_es2.c:9380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_aname[0x400];
data/pybik-3.0/csrc/_glarea_es2.c:13241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_glarea_es2.c:13245:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_glarea_ogl.c:555:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_glarea_ogl.c:8145:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char __pyx_v_pixel[4];
data/pybik-3.0/csrc/_glarea_ogl.c:8927:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_log[0x400];
data/pybik-3.0/csrc/_glarea_ogl.c:9029:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_log[0x400];
data/pybik-3.0/csrc/_glarea_ogl.c:9410:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char __pyx_v_aname[0x400];
data/pybik-3.0/csrc/_glarea_ogl.c:13257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_glarea_ogl.c:13261:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_gldraw_es2.c:551:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_gldraw_es2.c:3806:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_gldraw_es2.c:3810:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_gldraw_ogl.c:552:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_gldraw_ogl.c:3807:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_gldraw_ogl.c:3811:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_qt_qtwes2.cpp:637:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_qt_qtwes2.cpp:30136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_qt_qtwes2.cpp:30140:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[111];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[70];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[47];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[105];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:796:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[995];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1056:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[27];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[12];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[909];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[11];
data/pybik-3.0/csrc/_qt_qtwes2_moc.cpp:1498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[127];
data/pybik-3.0/csrc/_qt_qtwogl.cpp:638:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_qt_qtwogl.cpp:30128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_qt_qtwogl.cpp:30132:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[111];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[70];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[47];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[105];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:796:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[995];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1056:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[27];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[12];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[909];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[11];
data/pybik-3.0/csrc/_qt_qtwogl_moc.cpp:1498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[127];
data/pybik-3.0/csrc/_qtexec_.cpp:634:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_qtexec_.cpp:4796:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_qtexec_.cpp:4800:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_qtui_.cpp:635:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ascii_chars[128];
data/pybik-3.0/csrc/_qtui_.cpp:4193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctversion[4], rtversion[4];
data/pybik-3.0/csrc/_qtui_.cpp:4197:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[200];
data/pybik-3.0/csrc/_qtui__moc.cpp:23:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[28];
data/pybik-3.0/csrc/_qtui__moc.cpp:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stringdata0[40];
data/pybik-3.0/csrc/_glarea_es2.c:485:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_glarea_es2.c:599:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_glarea_es2.c:13396:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_glarea_ogl.c:486:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_glarea_ogl.c:600:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_glarea_ogl.c:13412:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_gldraw_es2.c:482:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_gldraw_es2.c:596:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_gldraw_es2.c:3889:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_gldraw_ogl.c:483:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_gldraw_ogl.c:597:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_gldraw_ogl.c:3890:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_qt_qtwes2.cpp:568:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_qt_qtwes2.cpp:682:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_qt_qtwes2.cpp:26888:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t slen = strlen(cstring);
data/pybik-3.0/csrc/_qt_qtwes2.cpp:30254:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_qt_qtwogl.cpp:569:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_qt_qtwogl.cpp:683:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_qt_qtwogl.cpp:26880:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t slen = strlen(cstring);
data/pybik-3.0/csrc/_qt_qtwogl.cpp:30246:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_qtexec_.cpp:565:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_qtexec_.cpp:679:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_qtexec_.cpp:3628:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t slen = strlen(cstring);
data/pybik-3.0/csrc/_qtexec_.cpp:4842:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));
data/pybik-3.0/csrc/_qtui_.cpp:566:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define __Pyx_PyByteArray_FromString(s) PyByteArray_FromStringAndSize((const char*)s, strlen((const char*)s))
data/pybik-3.0/csrc/_qtui_.cpp:680:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __PYX_DEFAULT_STRING_ENCODING = (char*) malloc(strlen(default_encoding_c));
data/pybik-3.0/csrc/_qtui_.cpp:1313:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  __pyx_t_3 = __Pyx_decode_c_string(__pyx_v_text, 0, strlen(__pyx_v_text), NULL, NULL, PyUnicode_DecodeUTF8); if (unlikely(!__pyx_t_3)) __PYX_ERR(0, 796, __pyx_L1_error)
data/pybik-3.0/csrc/_qtui_.cpp:3371:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t slen = strlen(cstring);
data/pybik-3.0/csrc/_qtui_.cpp:4276:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return __Pyx_PyUnicode_FromStringAndSize(c_str, (Py_ssize_t)strlen(c_str));

ANALYSIS SUMMARY:

Hits = 165
Lines analyzed = 111832 in approximately 3.12 seconds (35899 lines/second)
Physical Source Lines of Code (SLOC) = 68897
Hits@level = [0]   0 [1]  29 [2]  54 [3]   0 [4]  82 [5]   0
Hits@level+ = [0+] 165 [1+] 165 [2+] 136 [3+]  82 [4+]  82 [5+]   0
Hits/KSLOC@level+ = [0+] 2.39488 [1+] 2.39488 [2+] 1.97396 [3+] 1.19018 [4+] 1.19018 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.