* Mosè Giordano (2014-02-20) writes: > I'm sending a patch to address this problem. It simply adds a new > safe file-local variable (`TeX-command-extra-options') which is the > string of options to be passed to the TeX-processor through a new > expander in `TeX-expand-list'. In this way, eg, the shell escape can > be enabled with > %%% TeX-command-extra-options: "-shell-escape" > in the list of local variables, and a format file can be picked up with > %%% TeX-command-extra-options: "-fmt <format file>"
Couldn't -shell-escape be used to do malitious stuff together with the "right" LaTeX file contents? If that's the case I'd not make such a file-local variable safe. It would be better if the user had to confirm its use, especially if the file has not been prepared by herself. -- Ralf _______________________________________________ auctex-devel mailing list auctex-devel@gnu.org https://lists.gnu.org/mailman/listinfo/auctex-devel