This provides a 'meatier' version of caller:
caller_cv($level)
caller_cv gives you the coderef of the subroutine being invoked
at the call frame indicated by the value of $level
caller_args($level)
Returns the arguments passed into the caller at level $level
caller_vars( $level, $names ) =item called_with($level, $names)
called_with returns a list of references to the original
arguments to the subroutine at $level. if $names is true, the
names of the variables will be returned instead
constants are returned as undef in both cases
called_as_method($level)
called_as_method returns true if the subroutine at $level was
called as a method.
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.