Restricted Execution of untrusted code

Emanuele D'Arrigo manu3d at
Fri Oct 31 16:08:26 CET 2008

On Oct 30, 8:50 pm, Aaron Brady <castiro... at> wrote:
> Otherwise, you might be able to remove access to it by modifying
> however it is the 'cust' list is obtained.  Perhaps you can use the
> technique that's used to change the value of integers.  Keep us
> posted.  Does this give you any ideas?

Nope! Not really! These are python quirks beyond my current level of
knowledge! <sigh> =(

I suspect I'll simply drop from my application the possibility for
users to write their own plugins. Or I'll simply rely on the
unlikelihood of somebody taking the opportunity to do something
malicious. After all there are plenty of applications with an open-
architecture that leave the responsibility in the hands of the plugin
developers and the plugins users.

Thanks anyway!


More information about the Python-list mailing list