Draft

Exploit Me: TestCase Bypass IV

Description:

Exploit Me: TestCase Bypass IV


Task

Now I have merged TestCase Bypass with UserCodeCheck Bypass. This task is similar to the UserCodeCheck Bypass II but the overall protection has been, again, increased. Since some code check bypass methods have been prevented. You need to bypass the TestCases instead.

You have to write a mul(a,b) function receiving a and b as integer, and it should return a result of a * b.

There are tests as follow:

  • Enhanced Anti-Cheat detection in the Preloaded
  • Code length check in the TestCases
  • 100 randomized tests in the TestCases

Same as always, pass this kata. =]


Preloaded

const fs = module.require('fs');
const usercode = fs.readFileSync('/home/codewarrior/solution.txt', 'utf8');
const limit = 0;

ACTest();

TestCases

global.describe(`<${limit} characters`, function(){
  Test.assertDeepEquals(usercode.length < limit, true, `Unfortunately, it was tooooooo long!! :'(\nLimitation: <${limit}\nYour code: ${usercode.length}\n`);
});

global.describe('Example Test Case', function(){
  Test.assertDeepEquals(mul(2,4), 8, 'NO!!!');
});


|||| |---|---:| |Previous: TestCase Bypass III||

Exploit Me Series

Puzzles
Security

Stats:

CreatedJan 15, 2018
Warriors Trained8
Total Skips0
Total Code Submissions0
Total Times Completed0
JavaScript Completions0
Total Stars0
% of votes with a positive feedback rating0% of 0
Total "Very Satisfied" Votes0
Total "Somewhat Satisfied" Votes0
Total "Not Satisfied" Votes0
Ad
Contributors
  • ZahNarztiK Avatar
Ad