=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-656- elsif(ref($cmd) eq "ARRAY") { # direct exec(), no shell parsing libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:657: exec(@$cmd); libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:658: #croak("exec() failure: '$!'"); # causes warnings with '-w' libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-659- } libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-660- else { # start shell process libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:661: exec($cmd); libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm:662: #croak("exec() failure: '$!'"); # causes warnings with '-w' libproc-reliable-perl-1.16/.pc/fix-pod.patch/Reliable.pm-663- } ############################################## libproc-reliable-perl-1.16/Reliable.pm-656- elsif(ref($cmd) eq "ARRAY") { # direct exec(), no shell parsing libproc-reliable-perl-1.16/Reliable.pm:657: exec(@$cmd); libproc-reliable-perl-1.16/Reliable.pm:658: #croak("exec() failure: '$!'"); # causes warnings with '-w' libproc-reliable-perl-1.16/Reliable.pm-659- } libproc-reliable-perl-1.16/Reliable.pm-660- else { # start shell process libproc-reliable-perl-1.16/Reliable.pm:661: exec($cmd); libproc-reliable-perl-1.16/Reliable.pm:662: #croak("exec() failure: '$!'"); # causes warnings with '-w' libproc-reliable-perl-1.16/Reliable.pm-663- }