Object-Oriented Superglobals for Secure Input Filtering 2.3

All superglobals ($_GET, $_POST, $_REQUEST, $_SERVER) are wrapped into objects. Access is facilitated over filter functions or pre-defined filter lists. Array access syntax is still possible, but validation just a method name away:

$_GET->name["var"]
$_POST->ascii->text["field"]
$_REQUEST["raw"] // uses raw method or pre-defined filter

It can prevent raw access, but for transitioning the codebase allows it.

Also it's simple to define new filters or just reuse global functions or inject custom methods. When no best filter is available, it's possible to chain them, or resort to the ->log feature at least. And with "$_GET->xss->nocontrol->always()" a forced default filter can be set on legacy code.

License type: Other
Date added: 4 years, 1 month 17 days ago | Last updated: 3 years, 9 months 25 days ago

More popular Security System

This is actually one of the most advanced image hosting script. The imagetize key features: SEO, Ads Ready, Admin

Listing Files

Hot Scripts
Sponsors