How to Harden the PHP Execution Environment

To prevent malicious scripts from executing system-level commands, you must disable dangerous PHP functions. Follow this manual to harden your PHP security.

Step 1: Access the Security Tab

Inside the configuration portal for your target PHP version, navigate to the "Disabled Functions" tab.

Step 2: Adding Functions to the Blocklist

  1. Review the Neural Blocklist. BoostonCP pre-populates this with common dangerous functions: exec, shell_exec, system, passthru, proc_open.
  2. To add a new function, enter it into the input field and click "Add to Blocklist".
  3. To allow a function (e.g., if a specific CMS requires proc_open), click the Trash Icon next to its name in the list.
[IMAGE_PLACE_HOLDER: Disabled Functions - Screenshot of the function blocklist grid.]

Step 3: Verifying the Hardening

Click "Apply Security Policy". The system will update the disable_functions directive in the configuration and restart the engine. You can verify this by running a phpinfo() script on any website using that PHP version.

SECURITY HARDENING: Always keep shell_exec disabled on production servers unless absolutely necessary, as it is the primary gateway for web-based shell attacks.