T.ME/BIBIL_0DAY
CasperSecurity


Server : Apache/2
System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64
User : gositeme ( 1004)
PHP Version : 8.2.29
Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Directory :  /home/gositeme/.cursor-server/data/User/History/-45e93f62/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/gositeme/.cursor-server/data/User/History/-45e93f62/WR4f.php
<?php
// Debug Security Intelligence
// Define admin context to prevent redirects
define('ADMIN_CONTEXT', true);

error_reporting(E_ALL);
ini_set('display_errors', 1);

echo "Testing Security Intelligence Include...\n";

try {
    // Test security include
    echo "1. Testing security include...\n";
    require_once 'includes/security.php';
    echo "✅ Security include successful\n";
    
    // Test database connection
    echo "2. Testing database connection...\n";
    require_once 'config/database.php';
    $pdo = getDBConnection();
    echo "✅ Database connection successful\n";
    
    // Test admin access validation
    echo "3. Testing admin access validation...\n";
    // We'll skip this for now since we're not logged in
    echo "⚠️ Admin validation skipped (not logged in)\n";
    
    // Test security intelligence include
    echo "4. Testing security intelligence include...\n";
    ob_start();
    include 'admin_includes/security_intelligence.php';
    $output = ob_get_clean();
    echo "✅ Security intelligence include successful\n";
    echo "Output length: " . strlen($output) . " characters\n";
    
    echo "\n🎉 All tests passed!\n";
    
} catch (Exception $e) {
    echo "❌ Error: " . $e->getMessage() . "\n";
    echo "File: " . $e->getFile() . "\n";
    echo "Line: " . $e->getLine() . "\n";
}
?> 

CasperSecurity Mini