There is no safe eval. See
http://nedbatchelder.com/blog/201206/eval_really_is_dangerous.html.

Aaron Meurer

On Feb 25, 2013, at 4:11 AM, Chris Smith <[email protected]> wrote:

On Mon, Feb 25, 2013 at 4:53 PM, Stefan Krastanov
<[email protected]> wrote:

concerning the prime notation: lambdify works by printing out your

code, changing some imports and some names and then feeding it to

"eval". All of it is just string operations. Not only it will choke on

quotes, it can cause security holes if you hide malicious code in the

name of the symbol.


Can we fix this by limiting what eval has access to during this part
of the operation? (i.e. giving it a safe sandbox)?

-- 
You received this message because you are subscribed to the Google Groups
"sympy" group.
To unsubscribe from this group and stop receiving emails from it, send an
email to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/sympy?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.

-- 
You received this message because you are subscribed to the Google Groups 
"sympy" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/sympy?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to