I'd like to hear about how /xff/ indicates buffer overflow code. Or do you mean to detect source code that intends to exploit a bug in other unrelated software? This is... rather pointless and makes life harder since it /deletes/ the file in question. Beyond that point there's always #include statements to bring in other files and you have no way to detect that. If you meant to see if these strings are being given to the compiler then you'll need to run the actual compilation unit through this. So... either this code is misguided (and ineffective) or I've missed something fundamental to this script.
__SIG__
printf "You are here %08x\n", unpack "L!", unpack "P4", pack "L!", B::
+svref_2object(sub{})->OUTSIDE
|