GUI-scientific-calculator-using-python
GUI-scientific-calculator-using-python copied to clipboard
Code execution vulnerability
In your code, you are using the function eval(), which allows the user to execute any python code inputted, like __import__('os').system('whoami')
.
He should have used text box instead of input text box, In that case input would have been controlled by software instead
Moreover it doesn't even matter unless you are running your GUI on some kinda server, which I don't think you will ever do so.