=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== go-mmproxy-2.0/proxyprotocol.go-117- go-mmproxy-2.0/proxyprotocol.go:118:func PROXYReadRemoteAddr(buf []byte, protocol Protocol) (net.Addr, net.Addr, []byte, error) { go-mmproxy-2.0/proxyprotocol.go-119- if len(buf) >= 16 && bytes.Equal(buf[:12], ############################################## go-mmproxy-2.0/tcp.go-21- defer conn.Close() go-mmproxy-2.0/tcp.go:22: logger = logger.With(zap.String("remoteAddr", conn.RemoteAddr().String()), go-mmproxy-2.0/tcp.go:23: zap.String("localAddr", conn.LocalAddr().String())) go-mmproxy-2.0/tcp.go-24- go-mmproxy-2.0/tcp.go:25: if !CheckOriginAllowed(conn.RemoteAddr().(*net.TCPAddr).IP) { go-mmproxy-2.0/tcp.go-26- logger.Debug("connection origin not in allowed subnets", zap.Bool("dropConnection", true)) ############################################## go-mmproxy-2.0/tcp.go-46- go-mmproxy-2.0/tcp.go:47: saddr, _, restBytes, err := PROXYReadRemoteAddr(buffer[:n], TCP) go-mmproxy-2.0/tcp.go-48- if err != nil { ############################################## go-mmproxy-2.0/udp.go-160- go-mmproxy-2.0/udp.go:161: saddr, _, restBytes, err := PROXYReadRemoteAddr(buffer[:n], UDP) go-mmproxy-2.0/udp.go-162- if err != nil {