Because bounds cheching is ancillary to the behavior and use of strcpy(). Are they going to regurgitate the same "check your bounds" mantra on all routines that are potentially able to wantonly overwrite EIP?
Yes, I believe there should be a little blurb about "this is the function we always fsck up using that makes IIS so insecure, don't code like us!" =) You would think they would atleast plug their CString or sdt::string classes as a replacement for c-style char arrays.
Is it really MS' job to supply a caveat for all known issues associated with a given routine?
No, but it would be nice. Every man page I've read for strcpy says 'you should use strncpy instead, it's safer', it's not like it's a lot of work to type an extra sentence or two about security.
I , you would also agree with that lawsuit that required McDonald's to include the "Warning: Hot Coffee" label on all obviously hot cups of coffee
No, that's different. That woman has been drinking coffee for years and should have known better, not all programmers know all the caveats of all the functions they call.