I am solving the ctf challenge. Is it possible to bypass this RE and execute JS injection?
<script>
s=decodeURIComponent(location.search.substr(1));
if(/^[".=acdeimnotu]*$/.test(s))
eval(s);
</script>
P.S Don't worry, this is not a competitive challenge
Tried to encode payload but nothing comes out