Jul-23-2019, 02:27 PM
To get to the point people are avoiding.
eval(input(prompt))
in Python 3 is equivalent to input(prompt)
in Python 2. But the eval part is exactly why it was changed. The eval function can be used to inject malicious code, much like an SQL injection attack. If this is for code where you are the only user, that's not a problem. But if there is a possibility that an external user could be running the code it becomes a security risk.
Craig "Ichabod" O'Brien - xenomind.com
I wish you happiness.
Recommended Tutorials: BBCode, functions, classes, text adventures
I wish you happiness.
Recommended Tutorials: BBCode, functions, classes, text adventures