s c h e m a t i c s : c o o k b o o k

/ Cookbook.DynamicUntrustedEval

This Web


WebHome 
WebChanges 
TOC (with recipes)
NewRecipe 
WebTopicList 
WebStatistics 

Other Webs


Chicken
Cookbook
Erlang
Know
Main
Plugins
Sandbox
Scm
TWiki  

Schematics


Schematics Home
Sourceforge Page
SchemeWiki.org
Original Cookbook
RSS

Scheme Links


Schemers.org
Scheme FAQ
R5RS
SRFIs
Scheme Cross Reference
PLT Scheme SISC
Scheme48 SCM
MIT Scheme scsh
JScheme Kawa
Chicken Guile
Bigloo Tiny
Gambit LispMe
GaucheChez

Lambda the Ultimate
TWiki.org

Evaluating untrusted code

Problem

We want to evaluate code outside our control (e.g., deserializing s-expressions in data files).

Solution

Restrict the evaluated code so it has no file or network access:

500 Can't connect to 127.0.0.1:8778 (connect: Connection refused)

Discussion

This is a nice recipe. Are these security guards v300 specific? There is more to say in this recipe: one can prevent 'dangerous' functions from being executed by evaluating the code in a namespace that doesn't include the functions in question. -- NoelWelsh - 09 Dec 2004

Moved this recipe to DynamicChapter. Please help move other related recipes out of IdiomChapter and into DynamicChapter. -- NoelWelsh - 15 Apr 2005


Comments about this recipe

Contributors

-- DanielSilva - 09 Dec 2004

CookbookForm
TopicType: Recipe
ParentTopic: DynamicRecipes
TopicOrder: 999

 
 
Copyright © 2004 by the contributing authors. All material on the Schematics Cookbook web site is the property of the contributing authors.
The copyright for certain compilations of material taken from this website is held by the SchematicsEditorsGroup - see ContributorAgreement & LGPL.
Other than such compilations, this material can be redistributed and/or modified under the terms of the GNU Lesser General Public License (LGPL), version 2.1, as published by the Free Software Foundation.
Ideas, requests, problems regarding Schematics Cookbook? Send feedback.
/ You are Main.guest