But he didn't get it
Oh, I didn't see that post. My bad.
I'll add more detail with the example that I resolved earlier.
This was in one of my add-ons:
eval("%name = $OutputEvent_Name" @ %class @ "_" @ %output @ ";");%class was determined by the server, and was therefore safe, but %output was given directly by the client, through a serverCmd argument. Someone with malicious intent could manually call the command and pass anything, such as what Mold said earlier.