Safety of plugin?
-
The safety of this plugin has been called into question due to its use of
eval()
. As per https://php.net/manual/en/function.eval.php:The eval() language construct is very dangerous because it allows execution of arbitrary PHP code. Its use thus is discouraged. If you have carefully verified that there is no other option than to use this construct, pay special attention not to pass any user provided data into it without properly validating it beforehand.
Could you weigh in on this?
Thank you!
Viewing 2 replies - 1 through 2 (of 2 total)
Viewing 2 replies - 1 through 2 (of 2 total)
- The topic ‘Safety of plugin?’ is closed to new replies.