Compiler
Audit Installed Compilers and Their Packages
Compilers can be abused by attackers to perform the so-called privilege escalation attacks. Here is how to find compilers and secure your system.
Summary
Compilers and security
Compilers can be the gateway for an attacker. By misusing a possible weakness in your system(s), a compiler is often used to build the related exploit code. One way to prevent this is to determine what compilers are installed and remove (or restrict) them.
Comparing Installed Packages and Compilers
One way to audit the system is creating a list of common compilers and packages, then match these with the installed packages.