===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-656-      elsif(ref($cmd) eq "ARRAY") {  # direct exec(), no shell parsing
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:657:	exec(@$cmd);
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:658:	#croak("exec() failure: '$!'");  # causes warnings with '-w'
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-659-      }
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-660-      else {                         # start shell process
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:661:	exec($cmd);
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:662:	#croak("exec() failure: '$!'");  # causes warnings with '-w'
libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-663-      }
##############################################
libproc-reliable-perl-1.16/Reliable.pm-656-      elsif(ref($cmd) eq "ARRAY") {  # direct exec(), no shell parsing
libproc-reliable-perl-1.16/Reliable.pm:657:	exec(@$cmd);
libproc-reliable-perl-1.16/Reliable.pm:658:	#croak("exec() failure: '$!'");  # causes warnings with '-w'
libproc-reliable-perl-1.16/Reliable.pm-659-      }
libproc-reliable-perl-1.16/Reliable.pm-660-      else {                         # start shell process
libproc-reliable-perl-1.16/Reliable.pm:661:	exec($cmd);
libproc-reliable-perl-1.16/Reliable.pm:662:	#croak("exec() failure: '$!'");  # causes warnings with '-w'
libproc-reliable-perl-1.16/Reliable.pm-663-      }