=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== libsystem-command-perl-1.121/t/20-zombie.t-25-my $_is_alive = $win32 libsystem-command-perl-1.121/t/20-zombie.t:26: ? sub { return `tasklist /FO CSV /NH /fi "PID eq $_[0]" 2>NUL | find /I /N "$_[0]" >NUL` } libsystem-command-perl-1.121/t/20-zombie.t-27- : sub { return kill 0, $_[0]; }; ############################################## libsystem-command-perl-1.121/lib/System/Command.pm-151- # and finally, exec into @cmd libsystem-command-perl-1.121/lib/System/Command.pm:152: exec( { $cmd[0] } @cmd ) libsystem-command-perl-1.121/lib/System/Command.pm-153- or do { croak "Can't exec( @cmd ): $!"; } ############################################## libsystem-command-perl-1.121/lib/System/Command/Reaper.pm-38-my $_is_alive = MSWin32 libsystem-command-perl-1.121/lib/System/Command/Reaper.pm:39: ? sub { return `tasklist /FO CSV /NH /fi "PID eq $_[0]"` =~ /^"/ } libsystem-command-perl-1.121/lib/System/Command/Reaper.pm-40- : sub { return kill 0, $_[0]; };