![]() |
![]() | nucoder "Warning: indirect function call" | ![]() |
![]() |
![]() | ![]() |
Site Admin
![]() |
![]() |
It means that you have to take care and check that code carefully after encoding.
For example if you assign the variable with a name of your own (user-land) function and the function is obfuscated, php won't find it and you'll get function not found fatal error. |
|||||||||||
_________________ The PHP IDE team
|
![]() |
![]() | ![]() |
![]() |
![]() |
Thanks for the answer.
Just to be certain--> It is a controller. say I have class mycontroller { function get() { } call() { $this->$action(); } } This seems to work fine when $action == "get" And I use default option for "Obfscated names" (auto) should I use call_user_func()? I suspect the risk is identical. In the end, even if apparently it works, I should set nucoder to avoid obfucation on controllers? (in fact, I just checked, I use nucoder in command line & I pass < --obfuscation 1 > - I don't remember what it means) |
|||||||||||
|
![]() |
![]() | nucoder "Warning: indirect function call" | ![]() |
|
||
![]() |
![]() |
Content © NuSphere Corp., PHP IDE team
Powered by phpBB © phpBB Group, Design by phpBBStyles.com | Styles Database.
Powered by
Powered by phpBB © phpBB Group, Design by phpBBStyles.com | Styles Database.
Powered by
