It is easy to insert trojan horses into
shar files. It is strongly recommended that all shell archive files be examined before running them through
sh(1). Archives produced using this implementation of
shar may be easily examined with the command:
egrep -v '^[X#]' shar.file