in reply to user supplied regex substitution
Q1: nearly unintelligible; what AM's code? hacked how?
Q2: depends on intent of Q1. Please clarify.
Q3: Confusing at best. Are you really asking about methods to hack-proof a regex (regexen, generally?) or how to "give a malicious user" an opportunity to do something baaaad?
|
|---|