Juergen, In your project, do you use sanitizers for dynamic analysis? I use address, undefined, leak sanitizers for CLANG, G++, and address for VC++2026/2022/2019. I compile my unit tests in C++11/17/20/23/26 modes. Sergei
Juergen, I myself don't see any issues in the function with those variables (hv, inout and pl_tab_size). I use static code analyzers for CLANG and for VC++. They don't find any issues with the variables either. If you can suppress the warning (Enterprise level tools normally allow you to do that), that would reasonable. Cheers, Sergei
I should have asked whether the tool (Github Advanced Security Checking) is available as a standalone tool that I can use on my system? Sergei
Juergen, What tools do you use for scans? Sergei
Michael, I uploaded OTL 4.0.495. You'd need to use the following #defines in your environment: #define OTL_DEFAULT_STRING_NULL_TO_VAL L"" and #define OTL_DEFAULT_CHAR_NULL_TO_VAL L'*' Let me know if it works for you. Sergei
Michael, Is there a way for you to put together a self-contained code example that reproduces the error? It would make things easier to troubleshoot. Sergei
Try to define OTL_DEFAULT_STRING_NULL_TO_VAL as L"". Sergei
What would the name of the static landing page for my project be? Thanks, Sergei