===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp-378-	LoopBreakerTarget.sin_family = AF_INET;
ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp:379:	LoopBreakerTarget.sin_addr.s_addr = inet_addr ("127.0.0.1");
ruby-eventmachine-1.3~pre20190820-g10fb0c4/ext/em.cpp-380-
##############################################
ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb-1192-  #   EventMachine.run {
ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb:1193:  #     EventMachine.popen("ruby -e' $stdout.sync = true; gets.to_i.times{ |i| puts i+1; sleep 1 } '", RubyCounter)
ruby-eventmachine-1.3~pre20190820-g10fb0c4/lib/eventmachine.rb-1194-  #   }
##############################################
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-47-      EM.run{
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb:48:        $pids << EM.system('echo hi', proc{ |out,status|$pids << status.pid; EM.stop })
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-49-      }
##############################################
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-55-      EM.run{
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb:56:        EM.system('ls', proc{ |out,status| $out, $status = out, status; EM.stop })
ruby-eventmachine-1.3~pre20190820-g10fb0c4/tests/test_processes.rb-57-      }