safestringlib
The Secure Development Lifecycle (SDL) recommends banning certain C Libraryfunctions because they directly contribute to security vulnerabilities such asbuffer overflows. However routines for the manipulation of strings and memorybuffers are common in software and firmware, and are essential to accomplishcertain programming tasks. Safer replacements for these functions that avoid orprevent serious security vulnerabilities (e.g. buffer overflows, string formatattacks, conversion overflows/underflows, etc.) are available in the SafeStringLibrary.
https://github.com/intel/safestringlib
Available modules
The overview below shows which safestringlib installations are available per target architecture in the HPCC module system, ordered based on software version (new to old).
To start using safestringlib, load one of these modules using a module load command like:
module load safestringlib/20240228-intel-compilers-2023.1.0
(This data was automatically generated on Thu, 22 Jan 2026 at 12:03:27 EST)
| gateway | generic | zen2 | zen3 | zen4 | skylake_avx512 | |
|---|---|---|---|---|---|---|
| Gateway nodes | everywhere (except Grace nodes) | amd20 | amd22 | amd24 | intel18,amd20-v100,amd21,intel21 | |
| safestringlib/20240228-intel-compilers-2023.1.0 | - | x | - | - | - | - |