Hi,

some time ago, I noticed in the sources file modes that appear strange to me:

[gambas3]$ find . -executable -type f -regextype egrep -regex 
'.*\.(c|h|cpp|hpp)' -printf "%M\t%P\n"
-rwxr-xr-x      main/lib/option/main.c
-rwxr-xr-x      main/lib/option/getoptions.c
-rwxr-xr-x      main/lib/option/getoptions.h
-rwxr-xr-x      main/lib/option/main.h
-rwxr-xr-x      main/gbx/gbx_local.h
-rwxr-xr-x      main/gbx/gbx_subr_file.c
-rwxr-xr-x      gb.xml/src/xslt/CXSLT.cpp
-rwxr-xr-x      gb.xml/src/xslt/CXSLT.h
-rwxr-xr-x      gb.xml/src/xslt/main.h
-rwxr-xr-x      gb.xml/src/xslt/main.cpp
-rwxr-xr-x      gb.qt4/src/CContainer.cpp

There may be more... I just wanted to filter away the shell scripts and stuff 
that ought to be
executable (that's what I mean by "strange file modes" because I don't think 
those files above have
to be executable) quickly.
I noticed them only on C/C++ source files, so far and you see, there are a few 
(that's why I decided
to search for those in the above command). Nothing interesting but sometimes I 
startle up when
listing directory entries :)

(One may improve the command line and filter out the scripts used by the build 
system by their names
or something if this is really considered a security issue - I don't think so 
but I'm, too, not very
familiar with what could be done. I just want things clean)

Regards,
Tobi

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Gambas-user mailing list
Gambas-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gambas-user

Reply via email to