This provides a 'meatier' version of caller: caller_cv($level) caller_cv gives you the coderef of the subroutine being invoked at the call frame indicated by the value of $level caller_args($level) Returns the arguments passed into the caller at level $level caller_vars( $level, $names ) =item called_with($level, $names) called_with returns a list of references to the original arguments to the subroutine at $level. if $names is true, the names of the variables will be returned instead constants are returned as undef in both cases called_as_method($level) called_as_method returns true if the subroutine at $level was called as a method.
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.