> if I understood you correctly, you are asking what happens,
> if the untrusted script were:
>
> untrusted: [
> security: [file allow] get: func [/any][
> do %bad-stuff.r
> ] ]
>
> let's try it with a more comfortable/debugged secure-do
> (sent to [EMAIL PROTECTED]):
Howdy, Ladislav:
Had a look at what you put there-- really neato. It's great
to see that some of the finer higher level aspects of REBOL,
the context dependent nature of REBOL (the R.E.B. in
REB-ol), are being so well absorbed by people such as
yourself. I think the way contexts work is one of the
neatest things since sliced bread!
At some point there will be more built in support for
protected execution environments. Can't say when--
scheduling and development priorities are a complicated
thing. :)
-jeff