Re: Restricted Execution on the cheap

2004-11-30 Thread Nick Coghlan
David Pokorny wrote: Hi, Suppose that one wants to set up a machine to accept python code from, say, arbitrary email, and run it safely. Would the following (somewhat draconian) precautions be sufficient? In short, no. Python's introspection capabilities kill you. There are too many ways to spell

Re: Restricted Execution on the cheap

2004-11-30 Thread Duncan Booth
David Pokorny wrote: > Suppose that one wants to set up a machine to accept python code from, > say, arbitrary email, and run it safely. Would the following > (somewhat draconian) precautions be sufficient? > [assume the Python code is in hack.py] > > grep exechack.py ==> nothing > grep eval

Restricted Execution on the cheap

2004-11-30 Thread David Pokorny
Hi, Suppose that one wants to set up a machine to accept python code from, say, arbitrary email, and run it safely. Would the following (somewhat draconian) precautions be sufficient? [assume the Python code is in hack.py] grep exechack.py ==> nothing grep evalhack.py ==> nothing etc... f