#Embedded file name: ecshop_gbk_inj.py
import re
import urllib
if 0:
    i11iIiiIii

def assign(service, arg):
    if service == '''ecshop''':
        return (True, arg)
        if 0:
            O0 / iIii1I11I1II1 % OoooooooOO - i1IIi


def audit(arg):
    o0OO00 = arg
    oo, i1iII1IiiIiI1, iIiiiI1IiI1I1, o0OoOoOO00, I11i = curl.curl(o0OO00 + decode('\x95\x1aR\xbb\xd0Z8\xcd\x17\x06\xabN\xff\x12r\x94\xa5t\x98\xe0-\xa1-\x02\xb8Vw\x0ey\x7f5q\x9f\x15R\xdc\x95\x13~\xa7Q-\x88m\xb9\x16<\xc9\xce\x1f\xf3\xcc\n\xc3\r"\xd2\x1eS\x00w:^_\xf7\x1aR\xb4\xb5\x136\xa7Qn\x82&\xb8~{\xcc\xaeT\xf2\x8c\x06\x82CB\xb8R\x16\x05:_\x15^\xb719\x9a\xf4[{\x83\x1ao\xc6\r\xd3Py\x8a\xa6T\xf2\x8c%\xec%\x0c\xf06}h\x15_\x15\x1a\xf9\x12W\xb5\xb6\x126\xa7Qj\x88m\xbd\x0fy\xcd\xeew\xd1\xc6M\x83.L\xfd\x15\x14NR\x14\x10^\xd39\x11\x94\xdf^\x16\xed\x13-\xc1.\xba\x7fP\xa2\x87^\xf0\x8fO\xc1\x04b\xd1=\x7f,\x1bo\x16^\xf9{\x1c\xdb\xb7t4\x851\x0f\xa1\x03\x98T\x1d\xe3\xa0\\\xd9\xc6M\xc7\r"\xd2GM\x13f_\x15^\x9d\x12Y\xed\xb7Pz\x81\x7f\x19\xa0\r\xd3_Y\xe2\x840\x9f\xe2 \xa1\r"\xd2|r,R\x14PP\xdcUW\xf5\xfe0\x15\xe9q\x06\xedF\xf3\x7f\x17\xe3\xce\x1f\xb7\x81M\xc9Fg\x98}8HR\x14\x14u\xd6\x14V\xd0\xdezx\xc2{\x01\xe3\x02\xd1\\\x7f\x8c\xabi\x92\xe5`\xe9)K\xdd^\x14E6\x7fu\x14\xf6{S\xbb\xb0\x184\xa7Qn\xeb\x08\xf3\x7f\x13\xc7\xce\x1f\xb7\xe4\x06\x82\x03i\xd3|6mY'))
    if iIiiiI1IiI1I1 and iIiiiI1IiI1I1.find(decode('\xcf\x18R\xb3\xbe\x12?\x871\x07\xaaC\x81')) != -1:
        security_hole(o0OO00)
        if 0:
            OOooo000oo0.i1 * ii1IiI1i % IIIiiIIii


if __name__ == '__main__':
    from dummy import *

#KEY---ef632082c7620cf54876da74a1660bfb9c06eb94549b5f3bca646474000d0c46---