TICS Coding Standard Viewer 
TIOBE Software Quality Framework
Print-friendly version
©TIOBE Software www.tiobe.com
 
C++ Coding Standard
Search

Rule:  EXT01-CPPChecked automatically with code checker

Synopsis:The called function is unsafe for security related code
Language:C++
Severity Level:3
Category:Security


Description:

Examples of unsafe functions are:

  • I/O functions that could cause a buffer overflow such as scanf, fscanf and gets.
  • String buffer access functions that could cause a buffer overflow such as sprintf, sscanf, strcat, strcpy, and __builtin___sprintf_chk.
  • Pseudo-random number generation functions for which it is too easy to break the encryption such as initstate, lcong48, rand, random, seed48, setstate, and [dejlmn]rand48.