![]() Server : Apache/2 System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64 User : gositeme ( 1004) PHP Version : 8.2.29 Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname Directory : /home/gositeme/.cursor-server/data/User/History/-2b6a25e1/ |
<?php
// Test Admin Security - Simulate logged in admin
session_start();
// Simulate admin login
$_SESSION['user_id'] = 1;
$_SESSION['is_admin'] = true;
$_SESSION['last_activity'] = time();
// Define admin context
define('ADMIN_CONTEXT', true);
echo "Testing Admin Security Intelligence...\n";
try {
// Test security intelligence include
echo "1. Testing security intelligence include...\n";
ob_start();
include 'admin_includes/security_intelligence.php';
$output = ob_get_clean();
echo "✅ Security intelligence include successful\n";
echo "Output length: " . strlen($output) . " characters\n";
// Check if output contains expected content
if (strpos($output, 'Security Intelligence Center') !== false) {
echo "✅ Dashboard title found\n";
} else {
echo "❌ Dashboard title not found\n";
}
if (strpos($output, 'User Intelligence Database') !== false) {
echo "✅ User intelligence section found\n";
} else {
echo "❌ User intelligence section not found\n";
}
echo "\n🎉 Security Intelligence Dashboard Test Complete!\n";
echo "The dashboard should now be accessible at: admin.php?tab=security\n";
} catch (Exception $e) {
echo "❌ Error: " . $e->getMessage() . "\n";
echo "File: " . $e->getFile() . "\n";
echo "Line: " . $e->getLine() . "\n";
}
?>