in reply to Re^2: limiting scope of 'eval'??
in thread limiting scope of 'eval'??

I note a security implication here; you may have it covered.

Can flatfile be edited to include:

Kaboom! <% system(rm *) %>

or other (possibly inadvertent) malicious code?

Will index.pl run this code?

Regards,

PN5