3v4l.org

run code in 300+ PHP versions simultaneously
<?php $a = "SELECT _%asdf from user where test=_"; $b = mysql_real_escape_string($a); echo $b;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Cs1N9
function name:  (null)
number of ops:  7
compiled vars:  !0 = $a, !1 = $b
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'SELECT+_%25asdf+from+user+where+test%3D_'
    5     1        INIT_FCALL_BY_NAME                                       'mysql_real_escape_string'
          2        SEND_VAR_EX                                              !0
          3        DO_FCALL                                      0  $3      
          4        ASSIGN                                                   !1, $3
    6     5        ECHO                                                     !1
          6      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
155.78 ms | 1392 KiB | 13 Q