===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
nagzilla-2.0/debian/nagzilla.nagzillad.init-88-        # Obtain the uid and gid
nagzilla-2.0/debian/nagzilla.nagzillad.init:89:        DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'`
nagzilla-2.0/debian/nagzilla.nagzillad.init:90:        DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'`
nagzilla-2.0/debian/nagzilla.nagzillad.init-91-    else
##############################################
nagzilla-2.0/debian/nagzilla.nagzillad.init-105-    [ ! -d /proc/$pid ] &&  return 1
nagzilla-2.0/debian/nagzilla.nagzillad.init:106:    cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1`
nagzilla-2.0/debian/nagzilla.nagzillad.init-107-    # Is this the expected server
##############################################
nagzilla-2.0/debian/nagzilla.nagzillad.init-117-    [ ! -f "$PIDFILE" ] && return 1
nagzilla-2.0/debian/nagzilla.nagzillad.init:118:    pid=`cat $PIDFILE`
nagzilla-2.0/debian/nagzilla.nagzillad.init-119-    running_pid $pid $DAEMON || return 1