Safe

Hint for people stuck at finding the right technique to exploit the binary: Google the question the binary outputs and you will find a very similar example from a CTF where also the technique is mentioned and partially explained.