Ka-Ping Yee wrote:
> 2. Python will become vulnerable to a new class of security
> exploits via the writing of misleading or malicious code
> that is visually indistinguishable from correct code.
> Consequently it will be more difficult for humans to
> inspect code and assure its correctness or trustworthiness.
> There is very little established best practice for
> addressing homograph security issues.
>
Isn't it already easy enough to do that today?
>>> import base64; exec
base64.decodestring('cHJpbnQgJ0hlbGxvLCB3b3JsZCEn\n')
... Hello, world!
Admittedly, you could look for anything like that and be suspicious, but
running a program from an untrusted source is always going to be
dangerous. For standalone applications, you can already do things like
compile malicious C extension modules that are impossible to verify.
As for programs that use Python for scripting, shouldn't it be up to
them to ensure that it runs in a restricted environment? A browser, for
instance, would have to do that already.
- Ian D. Bollinger
_______________________________________________
Python-3000 mailing list
[email protected]
http://mail.python.org/mailman/listinfo/python-3000
Unsubscribe:
http://mail.python.org/mailman/options/python-3000/archive%40mail-archive.com