safer eval()
PHP Class
about
introduction and warning
restrictions
elements permitted by default
download
sourceforge.net project page
demo
hacking sandbox
contact
Demo notes
- You can use this form to test the security of safer eval() with any PHP script you input.
- Start/end PHP tags are not required or allowed.
- The demo uses the restrictions from the default safer eval() configuration.
- Allowed variable names for this install are $v (global) and $i (local).
- Feel free to try avoiding the security measures. Examples:
- setting the $x variable;
- calling the exit() function;
- using the echo token, etc.
- If you do manage, please let us know.
- Note: all attempts are IP-tracked.