|It is nice this class has been nominated for innovation award.|
i would like to explain some things since this is still work in progress
The idea behind it is to de-obfuscate obfuscated/encrypted PHP code and optionally beautify it.
PHP code that is obfuscated has many levels of eval(base64_decode(..))
constructs, which many times need to be de-obfuscated in-context.
This is still not working correctly (either for wholle packages or single files).
However a single file or package can be de-obfuscated and/or beautified if the previous condition is not important.
The way this happens is for the class to scan the source code for the eval statements and either de-obfuscate in-place or inject a special de-odfuscation snippet in-place which when the file is executed it will also de-obfuscate itself.
These are the 2 approaches, then an optional beautification step can be made also (or indepentantly)
In order to solve the previous prpblem of in-context de-obfuscation without having to execute the file or package (since it might be a malicious package) some kind of sandbox environment is needed
So in this sense it is still a work in progress for a generic to way to solve this.