There is no safe eval. See http://nedbatchelder.com/blog/201206/eval_really_is_dangerous.html.
Aaron Meurer On Feb 25, 2013, at 4:11 AM, Chris Smith <[email protected]> wrote: On Mon, Feb 25, 2013 at 4:53 PM, Stefan Krastanov <[email protected]> wrote: concerning the prime notation: lambdify works by printing out your code, changing some imports and some names and then feeding it to "eval". All of it is just string operations. Not only it will choke on quotes, it can cause security holes if you hide malicious code in the name of the symbol. Can we fix this by limiting what eval has access to during this part of the operation? (i.e. giving it a safe sandbox)? -- You received this message because you are subscribed to the Google Groups "sympy" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/sympy?hl=en. For more options, visit https://groups.google.com/groups/opt_out. -- You received this message because you are subscribed to the Google Groups "sympy" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/sympy?hl=en. For more options, visit https://groups.google.com/groups/opt_out.
