On Sun, Sep 21, 2014 at 06:56:27PM -0400, David T. Lewis wrote: > If you are booting directly into the image, you may find it useful to also > load CommandShell/OSProcess into your image. This will let you open a > Smalltalk shell window directly within your Squeak/Pharo boot image, so > that you have access to the operating system with actually opening any > windows or terminal sessions outside of your image. > > http://www.squeaksource.com/CommandShell > http://www.squeaksource.com/OSProcess
In view of ShellShock, from a PipeableOSProcess example: | env | env := OSProcess thisOSProcess environment copy. env at: #SHOCKED put: '() { :;}; echo ShellShocked;'. (PipeableOSProcess command: 'echo Nah environment: env) output This gives the following. (Yes, this is done on an unpatched bash for demo purposes. Everyone should patch as soon as you can.) ShellShocked Nah I have a webapp that shells out to some OS command line tool. I think I have written it such that untrustworthy web input does not taint the command line tool's environment and input. I think. Everyone doing similar may wish to relook at it. David, perhaps the code is already there, but can we run OS commands without invoking the shell? Pierce