Hi, some time ago, I noticed in the sources file modes that appear strange to me:
[gambas3]$ find . -executable -type f -regextype egrep -regex '.*\.(c|h|cpp|hpp)' -printf "%M\t%P\n" -rwxr-xr-x main/lib/option/main.c -rwxr-xr-x main/lib/option/getoptions.c -rwxr-xr-x main/lib/option/getoptions.h -rwxr-xr-x main/lib/option/main.h -rwxr-xr-x main/gbx/gbx_local.h -rwxr-xr-x main/gbx/gbx_subr_file.c -rwxr-xr-x gb.xml/src/xslt/CXSLT.cpp -rwxr-xr-x gb.xml/src/xslt/CXSLT.h -rwxr-xr-x gb.xml/src/xslt/main.h -rwxr-xr-x gb.xml/src/xslt/main.cpp -rwxr-xr-x gb.qt4/src/CContainer.cpp There may be more... I just wanted to filter away the shell scripts and stuff that ought to be executable (that's what I mean by "strange file modes" because I don't think those files above have to be executable) quickly. I noticed them only on C/C++ source files, so far and you see, there are a few (that's why I decided to search for those in the above command). Nothing interesting but sometimes I startle up when listing directory entries :) (One may improve the command line and filter out the scripts used by the build system by their names or something if this is really considered a security issue - I don't think so but I'm, too, not very familiar with what could be done. I just want things clean) Regards, Tobi ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Gambas-user mailing list Gambas-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/gambas-user