$self -> {$in} -> {cr} -> (); # run it, its valid, we leave the code ref # to the hacker. however, rather than return, we implicitly return # whatever the code they gave us returned for purposes of modularity