3v4l.org

run code in 300+ PHP versions simultaneously
<?php $y = str_replace('z', 'e', 'zxzc'); $y("malicious code");
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/KQisd
function name:  (null)
number of ops:  10
compiled vars:  !0 = $y
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'str_replace'
          1        SEND_VAL                                                 'z'
          2        SEND_VAL                                                 'e'
          3        SEND_VAL                                                 'zxzc'
          4        DO_ICALL                                         $1      
          5        ASSIGN                                                   !0, $1
    3     6        INIT_DYNAMIC_CALL                                        !0
          7        SEND_VAL_EX                                              'malicious+code'
          8        DO_FCALL                                      0          
          9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
158.79 ms | 1393 KiB | 15 Q