George Sakkis wrote:

You probably missed the point in the posted examples. A malicious user
doesn't need to modify your program code to have access to far more
than you would hope, just devise an appropriate string s and pass it
to your "safe" eval.

Oppps, I did miss the point. I was assuming that the modifying stuff was being done before the call to the eval(). I was wrong.

I'll have to get the ast based code incorporated into my code and just use it. Darn, but it seems that each and every time one sees a simple solution to a simple problem ... :)

Thanks.

--
http://mail.python.org/mailman/listinfo/python-list

Reply via email to