I am not familiar with eggdrops nor with the google and weather scripts you mentioned. I only know that scripts using $read and $readini without the n parameter are vulnerable to $finddir and $findfile. Can you find out whether this voiced person typed in $finddir or $findfile somewhere? Also, investigate all your scripts for $read and $readini statements without having the n parameter. They should be of the format $read(filename, n, ...) or $readini(filename, n, ...). If I'm right, I think this voiced person googled for something with $finddir of $filefind in it.... Same thing happens with seen scripts based on textfiles instead of hashtables...