On Tue, Feb 28, 2017 at 12:44 AM, Vincent Vande Vyvre <vincent.vande.vy...@telenet.be> wrote: > OK, it's coherent with the secure execution. >
Yep. Here's a PR to make the message a bit clearer, though: https://github.com/python/cpython/pull/340 >>> ast.literal_eval("print('hello world')") Traceback (most recent call last): File "<stdin>", line 1, in <module> File "/usr/local/lib/python3.7/ast.py", line 87, in literal_eval return _convert(node_or_string) File "/usr/local/lib/python3.7/ast.py", line 85, in _convert raise ValueError('%s not allowed in literal' % type(node).__name__) ValueError: Call not allowed in literal ChrisA -- https://mail.python.org/mailman/listinfo/python-list