my $cmd = "cd /home/foo/$row->{'dir'} && " . "./$row->{'name'}.pl >some.out 2>some.err &"; my $result = system ( $cmd );
Potential shell injection vulnerability ($row->{'dir'} and $row->{'name'}). Consider using fork and exec manually.
Rough sketch:
Related: The problem of "the" default shell
Alexander
In reply to Re^3: Can I use Mojo::IOLoop::Subprocess for a non-blocking process?
by afoken
in thread Can I use Mojo::IOLoop::Subprocess for a non-blocking process?
by talexb
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |