First off and in all seriousness, how current are your Mac OS X backups? Not because I think you have a problem (and I don't), but because backups are both part of your normal operations and part of recovering from a breach. If your backups aren't current, then go work on that right now. (Folks can get dazzled and simply forget to have and to keep current and keep deep backups.)
It is exceedingly unlikely you have a rootkit, and the tool you are using here can show false positives.
The paths I've seen used for all of the Mac breaches I've worked have been weak passwords, disabled or wide-open security, or folks that were installing stuff from untrusted sources. Trojans. Stuff that they knew they shouldn't be loading, in discussions. (This is also where the Mac App store approach is headed, too. Curation. To help reduce the likelihood that folks will be loading random cruft.)
The /dev stuff is where the devices reside in Mac OS X and most Unix systems. Specifically, those /dev/fd entries are file descriptor devices. They're not directories. /dev/fd/0, /dev/fd/1 and /dev/fd/2 are stdin, stdout and stderr channels, and the others are file system entries for whatever else happens to be active; that's a virtual view into the current process's channels. Most commonly encountered when you're noodling around in bash scripts.
And that rootkit tool you're running? Not to make you paranoid, but do you trust the package? It has been authenticated for and now has root access, after all. These sorts of security tools are certainly good and classic means for installing trojans, and both ignorance and fear and greed have been used to get users to load their trojans.
Review the source code and see what the details of the failed test were. I suspect spurious. Barring cases where you've been exploring areas of the 'net you probably should not (and downloading and loading and authenticating questionable bits), I suspect you're wasting your time looking for rootkits. Work on your backups, on improving your passwords and on your operational security.
The chances that you have a rootkit? Exceedingly slim.