I understand exactly what you want to do. I understood it without needing the screenshot.
However, I do not understand why you are trying to approach the problem this way.
As I already explained in my previous post, you are trying to address a symptom of a problem, not fix the actual problem. If a c99 shell was uploaded, it was probably not because an attacker was able to get information about the PHP configuration from environment variables. The real problem, the one you are not addressing, is that somehow, some way, you have a vulnerability that allowed an attacker to upload and execute malicious code.
That vulnerability will still be there, whether or not the environment variables are accessible.
The way you are trying to address this is simply not possible, without modifying and recompiling PHP, and even if you did so, it would break legitimate scripts that need to access those environment variables, and your server would still be vulnerable to exploitation.
You would get the worst of two situations: your clients' legitimate scripts not working, and your server still being exploited.
You need to look at the real problem, as I said in my previous post, which is that an attacker can upload and execute malicious code. That is the actual problem. That is going to continue to happen, whether or not scripts can get information about the PHP environment, until you audit the scripts you host to find what is allowing the malicious code to be uploaded and executed.