Skip to content

fix: the strcpy call at runtime/memory/memory in memory.c#446

Merged
nicolasmd87 merged 1 commit into
aether-lang-org:mainfrom
orbisai0security:fix-v-001-strcpy-bounds-check-memory-c
May 11, 2026
Merged

fix: the strcpy call at runtime/memory/memory in memory.c#446
nicolasmd87 merged 1 commit into
aether-lang-org:mainfrom
orbisai0security:fix-v-001-strcpy-bounds-check-memory-c

Conversation

@orbisai0security
Copy link
Copy Markdown
Contributor

Summary

Fix critical severity security issue in runtime/memory/memory.c.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File runtime/memory/memory.c:143

Description: The strcpy call at runtime/memory/memory.c:143 copies a string into a destination buffer without any bounds checking. strcpy performs no length validation and will write past the end of the destination buffer if the source string is longer than the allocated space, corrupting adjacent heap or stack memory. This is a classic CWE-120 'Buffer Copy Without Checking Size of Input' vulnerability.

Changes

  • runtime/memory/memory.c

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
@nicolasmd87 nicolasmd87 merged commit 0444b0f into aether-lang-org:main May 11, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants