Draft
Exploit Me: TestCase Bypass IV
Description:
Exploit Me: TestCase Bypass IV
Task
Now I have merged TestCase Bypass with UserCodeCheck Bypass. This task is similar to the UserCodeCheck Bypass II but the overall protection has been, again, increased. Since some code check bypass methods have been prevented. You need to bypass the TestCases instead.
You have to write a mul(a,b)
function receiving a
and b
as integer, and it should return a result of a * b
.
There are tests as follow:
- Enhanced Anti-Cheat detection in the Preloaded
- Code length check in the TestCases
- 100 randomized tests in the TestCases
Same as always, pass this kata. =]
Preloaded
const fs = module.require('fs');
const usercode = fs.readFileSync('/home/codewarrior/solution.txt', 'utf8');
const limit = 0;
ACTest();
TestCases
global.describe(`<${limit} characters`, function(){
Test.assertDeepEquals(usercode.length < limit, true, `Unfortunately, it was tooooooo long!! :'(\nLimitation: <${limit}\nYour code: ${usercode.length}\n`);
});
global.describe('Example Test Case', function(){
Test.assertDeepEquals(mul(2,4), 8, 'NO!!!');
});
Note: The purpose of Exploit Me kata series is to study about vulnerabilities in CodeWar test system, in order to prevent them as much as possible in authoring prospective katas. Using this knowledge exploiting other katas to pass them illegally is not recommended. =]
|||| |---|---:| |Previous: TestCase Bypass III||
Exploit Me Series |
Puzzles
Security
Similar Kata:
Stats:
Created | Jan 15, 2018 |
Warriors Trained | 8 |
Total Skips | 0 |
Total Code Submissions | 0 |
Total Times Completed | 0 |
JavaScript Completions | 0 |
Total Stars | 0 |
% of votes with a positive feedback rating | 0% of 0 |
Total "Very Satisfied" Votes | 0 |
Total "Somewhat Satisfied" Votes | 0 |
Total "Not Satisfied" Votes | 0 |