Security vulnerabilities and risk

He can do forbidden codes and other things for homework. For example, you can print a key logger, it will accept when you explain in different formats. These gaps need to be closed.