3v4l.org

run code in 300+ PHP versions simultaneously
<?php // Hacker stuff $request_data['auth_token'] = 0; // Your code define("AUTH_TOKEN", "I08L3Xh4507Ieue3zVi3Ny08EcLnUeQz"); if(!isset($request_data['auth_token']) || $request_data['auth_token'] != AUTH_TOKEN) { http_response_code(403); die("Forbidden"); } echo 'Welcome!';
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 47) Position 1 = 9, Position 2 = 13
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 18
Branch analysis from position: 14
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 18
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 13
filename:       /in/PEJ6Y
function name:  (null)
number of ops:  20
compiled vars:  !0 = $request_data
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN_DIM                                               !0, 'auth_token'
          1        OP_DATA                                                  0
    6     2        INIT_FCALL                                               'define'
          3        SEND_VAL                                                 'AUTH_TOKEN'
          4        SEND_VAL                                                 'I08L3Xh4507Ieue3zVi3Ny08EcLnUeQz'
          5        DO_ICALL                                                 
    8     6        ISSET_ISEMPTY_DIM_OBJ                         0  ~3      !0, 'auth_token'
          7        BOOL_NOT                                         ~4      ~3
          8      > JMPNZ_EX                                         ~4      ~4, ->13
          9    >   FETCH_DIM_R                                      ~5      !0, 'auth_token'
         10        FETCH_CONSTANT                                   ~6      'AUTH_TOKEN'
         11        IS_NOT_EQUAL                                     ~7      ~5, ~6
         12        BOOL                                             ~4      ~7
         13    > > JMPZ                                                     ~4, ->18
    9    14    >   INIT_FCALL                                               'http_response_code'
         15        SEND_VAL                                                 403
         16        DO_ICALL                                                 
   10    17      > EXIT                                                     'Forbidden'
   13    18    >   ECHO                                                     'Welcome%21'
         19      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
167.08 ms | 1395 KiB | 17 Q