Potential command injection with user input detected.

Description

It is dangerous to use eval with user input, or to compile code with user-supplied data. Such practices can lead to command injection.

Remediations

❌ Avoid using code execution methods with unsanitized user input.

Resources

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=php_lang_eval_using_user_input

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=php_lang_eval_using_user_input

Ready to take the next step? Learn more about Bearer Cloud.