Readers unfamiliar with the code may see a code injection
vulnerability here, so try to reassure them that we're using
`--perl'-escaped output from git-for-each-ref(1) that ought
to be safe to run through `eval'.
while ($lbuf =~ s/\A([^\0]+)\0\n//s) {
utf8_maybe($bdy = $1);
if ($is_tag) {
- my %r;
- eval "$bdy";
+ my %r; # filled by eval:
+ eval "$bdy"; # `git for-each-ref --perl' output
for (qw(contents:subject contents:body)) {
$r{$_} =~ /\S/ or delete($r{$_})
}