Total Members Voted: 42
The cool thing about expandEscape() is that it grows exponentially, so if you call it on a string n times, you end up with a string of length 2^n
It needs to be called at least once if you are planning on using the string in an eval statement. Otherwise, you get code injection vulnerabilities. The issue here is that it is being done twice, which turns " -> \" -> \\\".
You don't need to use the string in an eval statement though. Calling eval inside a function uses the same context, so you can easily access local variables.
%val = "test";%blah = "blah";eval("echo(%val);");eval("%val = %blah;");echo(%val);
An update has been released. Thanks for your help!
heh it seems sort of funny that you can update the updater with the updater
GITHUB? XD