1. Flaws of Legacy C String Functions
Critics highlight issues with strcpy (unsafe without bounds), strncpy (poor API, no null-termination guarantee, historical fixed-width use), and truncation behaviors.
"Removing strcpy from your code does not make it memory safe." (saagarjha)
"strncpy was initially introduced... to deal with fixed-length name fields... Such fields are not used in the same way as strings." (tourist2d, quoting rationale)
2. AI-Generated "Slop" Vulnerability Reports
Maintainers face harassment from bogus AI-flagged strcpy issues, often without repro steps or payouts, acting as honeypots.
"It has been proven... that strcpy in source code is like a honey pot for generating hallucinated vulnerability claims." (Scubabear68, quoting article)
"It's a symptom of complete failure... to stave off harassment over false security impact from bots." (easterncalculus)
3. Need for Safer, Modern String Handling
Calls for length-aware APIs, new stdlib functions, or libraries like bstrlib/slices to replace null-terminated strings.
"strcpy has the best interface... if you know this then you can just use memcpy instead." (jandrese)
"Is it really too late for the C committee... to develop a modern string library?" (jandrese)