=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py-44- ("fread(): supplied argument is not", "fread()"), wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py:45: ("fpassthru(): supplied argument is not", "fpassthru()"), wapiti-3.0.3+dfsg/wapitiCore/attack/mod_file.py-46- ("for inclusion (include_path=", "include()"), ############################################## wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-219-[cloudflare_bypass] wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini:220:payload = <img src onerror= prompt`${/__XSS__/}`> wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-221-tag = img wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-222-attribute = onerror wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini:223:value =  prompt`${/__XSS__/}` wapiti-3.0.3+dfsg/wapitiCore/config/attacks/xssPayloads.ini-224-case_sensitive = yes