The fritzing port includes many files inside the directory /usr/local/share/fritzing and other directories which are world writable and executable and some of them are binaries loaded by other users. This seams to unnecessary and implements a security risk.
Created attachment 206537 [details]
The suggested patch does not improve this situation much? It still leaves files group writable (why?). There are some Python files which we probably want to be executable, but the rest can indeed be non-executable.