Frank <frankli0...@hotmail.com> added the comment:

PEP 551 is confusing. It looked suggesting that it's a "security tool" that 
"detects, identifies and analyzes misuse of Python" to me (and apparently many 
others).

examples shown in the PEP includes WannaCrypt, APTs, all of which involves the 
good old remote code execution, which is basically a sandboxed environment it 
self, at least in some way.

also, the challenges provided the contestants with a "background story" that 
enables an attacker to execute arbitrary code doesn't mean that one HAVE to 
gain code execution to achieve the goal of bypassing the aevents. in this case, 
one only have to find the list object which contains the audit hooks 
registered, and clear it(or replace it). this clearly breaks the promise made 
in PEP 578 (Hooks cannot be removed or replaced). THIS SHOULD BE FIXED.

ALSO(again), the software is not always doing what it's designed to do. maybe, 
I mean maybe, developers should make changes according to what users are doing. 
I don't know, really.

----------
nosy: +frankli

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue43438>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to