Thanks, Justin.  I am really trying to figure something else out instead of
eval. It is really too much of a security hole. I really appreciate the
community to bounce ideas.

Regards,
Dave


----------
>From: Justin French <[EMAIL PROTECTED]>
>To: David Pratt <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
>Subject: Re: [PHP] Example safe use of eval()
>Date: Thu, Aug 1, 2002, 5:35 PM
>

> You can't really do much to make sure the execution of eval is safe, it's
> more than you have to trust the string that you're about to eval().
>
> So, as long as you and your production team were the only ones who put the
> code into the strings or tables, and tested the code before hand, then 90%
> there.
>
> I'd suggest also reading all the user-contributed notes at
> http://php.net/eval too.
>
>
> Justin
>
>
> on 02/08/02 5:26 AM, David Pratt ([EMAIL PROTECTED]) wrote:
>
>> I am trying to get code that I have saved as a string in a database to
>> evaluate as code within a larger script with a loop. There are  obvious
>> security concerns with allowing users to input code into the field if it is
>> not preprocessed before it is evaluated. The eval function appears to be the
>> ticket with PHP 4 since it will return the results as well. Has anyone got
>> an example of an appropriate preprocessing strategy and/or example of eval()
>> being used this way?  Thanks to those that replied to my original post.
>>
>> --
>>
>> Dave Pratt
>
> 

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to