No, there's no way for you to prove you are not using exploits when your system, running exclusively on the commands and information you have given it, has already told us explicitly what it is using.
Additionally it is impossible to have these commands running without noticing, which means...