=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp-378- LoopBreakerTarget.sin_family = AF_INET; ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp:379: LoopBreakerTarget.sin_addr.s_addr = inet_addr ("127.0.0.1"); ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp-380- ############################################## ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb-1192- # EventMachine.run { ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb:1193: # EventMachine.popen("ruby -e' $stdout.sync = true; gets.to_i.times{ |i| puts i+1; sleep 1 } '", RubyCounter) ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb-1194- # } ############################################## ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-47- EM.run{ ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb:48: $pids << EM.system('echo hi', proc{ |out,status|$pids << status.pid; EM.stop }) ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-49- } ############################################## ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-55- EM.run{ ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb:56: EM.system('ls', proc{ |out,status| $out, $status = out, status; EM.stop }) ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-57- }