> if I understood you correctly, you are asking what happens,
> if the untrusted script were:
> 
> untrusted: [
>      security: [file allow] get: func [/any][
>          do %bad-stuff.r
>      ] ]
> 
> let's  try  it with  a  more comfortable/debugged secure-do
> (sent to [EMAIL PROTECTED]):


  Howdy, Ladislav: 

  Had a look at what you put there-- really neato. It's great
  to see that some of the finer higher level aspects of REBOL,
  the context dependent nature of REBOL (the R.E.B. in
  REB-ol), are being so well absorbed by people such as
  yourself.  I think the way contexts work is one of the
  neatest things since sliced bread!

  At some point there will be more built in support for
  protected execution environments.  Can't say when--
  scheduling and development priorities are a complicated
  thing. :)

  -jeff


Reply via email to