On Mon, Feb 13, 2012 at 7:26 PM, Leo Razoumov <slonik...@gmail.com> wrote:

> On Mon, Feb 13, 2012 at 18:30, Gé Weijers <g...@weijers.org> wrote:
> > On Mon, Feb 13, 2012 at 1:49 PM, Steve Bennett <ste...@workware.net.au>
> > wrote:
> >>
> >> Joe Mistachkin has recently added support for calling TH1 scripts on
> >> certain actions.
> >> See http://www.fossil-scm.org/index.html/info/0b61e3c019
> >>
> >> In the jimtcl branch, TH1 is replaced with Jim Tcl, so any of these
> >> scripts has the full power of Jim Tcl, including exec.
> >>
> >
> > This sounds a whole lot like mobile code. I was left wondering: would it
> be
> > enough to do a 'fossil clone <something>' to download a malware script
> > onto my system? How is this capability secured?
>
> Are TH1 and Tcl interpreters properly sand-boxed? Otherwise,
> downloading and running random scripts found in some random repos does
> not strike me as a sound security.
>

I don't know what others plan on doing with this but in no usage that I can
think of would automatically syncing the scripts to another repo make
sense. Perhaps they could come across on a config pull.



> --Leo--
> _______________________________________________
> fossil-users mailing list
> fossil-users@lists.fossil-scm.org
> http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users
>
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to