* Mosè Giordano (2014-02-20) writes:

> I'm sending a patch to address this problem.  It simply adds a new
> safe file-local variable (`TeX-command-extra-options') which is the
> string of options to be passed to the TeX-processor through a new
> expander in `TeX-expand-list'.  In this way, eg, the shell escape can
> be enabled with
>     %%% TeX-command-extra-options: "-shell-escape"
> in the list of local variables, and a format file can be picked up with
>     %%% TeX-command-extra-options: "-fmt <format file>"

Couldn't -shell-escape be used to do malitious stuff together with the
"right" LaTeX file contents?  If that's the case I'd not make such a
file-local variable safe.  It would be better if the user had to confirm
its use, especially if the file has not been prepared by herself.

-- 
Ralf

_______________________________________________
auctex-devel mailing list
auctex-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/auctex-devel

Reply via email to