This script uses a standard PHP function strip_tags which is typically used to prevent code injection into web applications. The function in this example is called with a reasonable set of allowable tags, namely: <p><a><img><b><table><tr><td><div>.

As it turns out, some types of code still pass around it. Please try:


Raw result:

"Live" result: