As duff suggests, you should read perlsec.
Just to stress the point: accepting input from an untrusted source - especially when that input will be eval'ed by perl - can be a serious security hole.
Imagine if the input was `rm -rf /`...
If the information in this post is inaccurate, or just plain wrong, don't just downvote - please post explaining what's wrong.
That way everyone learns.
In reply to Re: Executing text
by BazB
in thread Executing text
by paulacocacola
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |