I note a security implication here; you may have it covered.
Can flatfile be edited to include:
Kaboom! <% system(rm *) %>
or other (possibly inadvertent) malicious code?
Will index.pl run this code?
Regards,
PN5
In reply to Re^3: limiting scope of 'eval'??
by Prior Nacre V
in thread limiting scope of 'eval'??
by ManFromNeptune
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |