"People should not expect PHP to be able to enforce security boundaries on a developer that has permissions to run custom PHP code," Gutmans said. "It's an inherently flawed scenario — and it's the wrong layer to protect in. People must rely on properly-configured OS-level permissions for securing against untrusted developers."
I have the simplest tastes. I am always satisfied with the best. -- Oscar Wilde