Lately, I've been seeing quite a few review comments indicating to remove this code, due to security issues:<div><br></div><div><blockquote style="margin:0 0 0 40px;border:none;padding:0px"><div><p style="font-family:Verdana,Arial,'Bitstream Vera Sans',Helvetica,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
if ( !empty( $_SERVER<a class="missing wiki" href="http://themes.trac.wordpress.org/wiki/SCRIPT_FILENAME" rel="nofollow" style="text-decoration:none;color:rgb(153,153,136);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(187,187,187)">SCRIPT_FILENAME?</a> ) && 'comments.php' == basename( $_SERVER<a class="missing wiki" href="http://themes.trac.wordpress.org/wiki/SCRIPT_FILENAME" rel="nofollow" style="text-decoration:none;color:rgb(153,153,136);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(187,187,187)">SCRIPT_FILENAME?</a> ) )<br>
</p><blockquote style="font-family:Verdana,Arial,'Bitstream Vera Sans',Helvetica,sans-serif;font-size:13px;background-color:rgb(255,255,255)"><p>die ( 'Please do not load this page directly. Thanks!' );</p>
</blockquote></div></blockquote></div><div><br></div><div>I don't believe that $_SERVER data used in this manner (i.e. as a conditional query, with no data being saved to the DB or output) is a security risk. What are your thoughts?</div>
<div><br></div><div>Chip</div>