unofficial mirror of guile-user@gnu.org 
 help / color / mirror / Atom feed
* Embedding Guile with sandboxing
@ 2015-11-21 18:35 Matthew Keeter
  2015-11-21 21:39 ` Pascal J. Bourguignon
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: Matthew Keeter @ 2015-11-21 18:35 UTC (permalink / raw)
  To: guile-user

I’m currently embedding Python in a C / C++ application that evaluates user-provided scripts.

Obviously, this is terribly unsafe: user-provided scripts can execute arbitrary malicious actions,
and there’s no good way to sandbox Python in a desktop context.

If I were to replace Python with Guile, is there a way to sandbox it so that arbitrary (perhaps
malicious) user-provided scripts can be run safely?

Regards,
Matt


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2015-11-25 14:36 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-11-21 18:35 Embedding Guile with sandboxing Matthew Keeter
2015-11-21 21:39 ` Pascal J. Bourguignon
2015-11-24 16:35   ` Amirouche Boubekki
2015-11-21 21:40 ` Thompson, David
2015-11-22 10:06 ` Arne Babenhauserheide
2015-11-25 11:07   ` tomas
2015-11-22 15:51 ` Christopher Allan Webber
2015-11-23  0:50   ` Roberto Baleno
2015-11-23 14:55     ` Matthew Keeter
2015-11-25 14:36       ` Christopher Allan Webber

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).