===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py-44-        ("fread(): supplied argument is not", "fread()"),
wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py:45:        ("fpassthru(): supplied argument is not", "fpassthru()"),
wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py-46-        ("for inclusion (include_path=", "include()"),
##############################################
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-219-[cloudflare_bypass]
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini:220:payload = <img src onerror=&emsp;prompt`${/__XSS__/}`>
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-221-tag = img
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-222-attribute = onerror
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini:223:value = &emsp;prompt`${/__XSS__/}`
wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-224-case_sensitive = yes