The pyEvaluator authors implemented several classical techniques to counter reverse engineering (compilation of python sources to .pyc files, source code obfuscation...), and also to prevent the exploitation of vulnerabilities. But that's not an issue for you, right?
The application is launched with xinetd and is available in TCP at the address pyevaluator.hax.w3challs.com:42007.
Your goal is to find and read the flag.
You'll have to find out how to spawn a shell.