David Pokorny wrote:
Hi,
Suppose that one wants to set up a machine to accept python code from,
say, arbitrary email, and run it safely. Would the following
(somewhat draconian) precautions be sufficient?
In short, no. Python's introspection capabilities kill you. There are too many
ways to spell
David Pokorny wrote:
> Suppose that one wants to set up a machine to accept python code from,
> say, arbitrary email, and run it safely. Would the following
> (somewhat draconian) precautions be sufficient?
> [assume the Python code is in hack.py]
>
> grep exechack.py ==> nothing
> grep eval
Hi,
Suppose that one wants to set up a machine to accept python code from,
say, arbitrary email, and run it safely. Would the following
(somewhat draconian) precautions be sufficient?
[assume the Python code is in hack.py]
grep exechack.py ==> nothing
grep evalhack.py ==> nothing
etc... f