How to Harden the PHP Execution Environment
To prevent malicious scripts from executing system-level commands, you must disable dangerous PHP functions. Follow this manual to harden your PHP security.
Step 1: Access the Security Tab
Inside the configuration portal for your target PHP version, navigate to the "Disabled Functions" tab.
Step 2: Adding Functions to the Blocklist
- Review the Neural Blocklist. BoostonCP pre-populates this with common dangerous functions:
exec, shell_exec, system, passthru, proc_open. - To add a new function, enter it into the input field and click "Add to Blocklist".
- To allow a function (e.g., if a specific CMS requires
proc_open), click the Trash Icon next to its name in the list.
Step 3: Verifying the Hardening
Click "Apply Security Policy". The system will update the disable_functions directive in the configuration and restart the engine. You can verify this by running a phpinfo() script on any website using that PHP version.
SECURITY HARDENING: Always keep
shell_exec disabled on production servers unless absolutely necessary, as it is the primary gateway for web-based shell attacks.