=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== speechd-up-0.5~20110719/debian/speechd-up.init-92- # Obtain the uid and gid speechd-up-0.5~20110719/debian/speechd-up.init:93: DAEMONUID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $3}'` speechd-up-0.5~20110719/debian/speechd-up.init:94: DAEMONGID=`getent passwd |grep "^$DAEMONUSER:" | awk -F : '{print $4}'` speechd-up-0.5~20110719/debian/speechd-up.init-95- else ############################################## speechd-up-0.5~20110719/debian/speechd-up.init-109- [ ! -d /proc/$pid ] && return 1 speechd-up-0.5~20110719/debian/speechd-up.init:110: cmd=`cat /proc/$pid/cmdline | tr "\000" "\n"|head -n 1 |cut -d : -f 1` speechd-up-0.5~20110719/debian/speechd-up.init-111- # Is this the expected server ############################################## speechd-up-0.5~20110719/debian/speechd-up.init-121- [ ! -f "$PIDFILE" ] && return 1 speechd-up-0.5~20110719/debian/speechd-up.init:122: pid=`cat $PIDFILE` speechd-up-0.5~20110719/debian/speechd-up.init-123- running_pid $pid $DAEMON || return 1