Matches an HTTPS request targeting the exposed PHPUnit utility script vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.
This file has been widely abused in real-world attacks to achieve remote code execution when PHPUnit is left accessible in production environments. Attackers leverage this endpoint to submit arbitrary PHP code via the request body for execution.
Requests to this path are strong indicators of automated exploitation scanning targeting misconfigured or development-deployed PHP applications.