1000-ft view: this page intentionally shows misconfigured settings that leak sensitive details or weaken controls. Use it to understand the risks before viewing the secure fixes.
Why it’s bad: phpinfo() dumps versions, extensions, paths, env vars and more—
a recon goldmine for attackers.
Why it’s bad: detailed errors reveal file paths, queries, and code locations—perfect for targeted exploitation.
Why it’s bad: auto-indexing leaks filenames and structure—useful for finding secrets and admin paths.
.htaccess_insecure is active as .htaccess.Why it’s bad: storing configs/secrets in webroot or allowing direct access exposes keys and passwords.
.env file.config.php file.Why it’s bad: shipping with known defaults lets attackers walk right in.
admin / admin to access the demo panel.