Re: Embedding Guile with sandboxing

2015-11-25 Thread Christopher Allan Webber
Antimony looks really cool! I agree that Guile doesn't provide a silver bullet here. Again, I think it can be done... though I think it'll require a lot of yak hair traversal to get to that point :) Good luck, have fun, and happy hacking!

Re: Embedding Guile with sandboxing

2015-11-25 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, Nov 22, 2015 at 11:06:05AM +0100, Arne Babenhauserheide wrote: > Am Samstag, 21. November 2015, 13:35:12 schrieb Matthew Keeter: > > If I were to replace Python with Guile, is there a way to sandbox it so > > that arbitrary (perhaps > > malici

Re: Embedding Guile with sandboxing

2015-11-24 Thread Amirouche Boubekki
Le 2015-11-21 22:39, Pascal J. Bourguignon a écrit : Matthew Keeter writes: I’m currently embedding Python in a C / C++ application that evaluates user-provided scripts. Obviously, this is terribly unsafe: user-provided scripts can execute arbitrary malicious actions, and there’s no good w

Re: Embedding Guile with sandboxing

2015-11-23 Thread Matthew Keeter
Context: Antimony is a tool for computer-aided design that makes heavy use of user-defined scripts (http://www.mattkeeter.com/projects/antimony). I’m considering other languages, either for Antimony or future projects. Python is great, but I’m running into two main issues: It’s hard to distribute

Re: Embedding Guile with sandboxing

2015-11-22 Thread Roberto Baleno
I've also been thinking about this issue with an embedded language I am developing in Guile. How about the good old metacircular evaluator: https://mitpress.mit.edu/sicp/full-text/sicp/book/node76.html BTW, Matt, are you porting "Antimony" to Guile? :) --Bert On Sun, Nov 22, 2015 at 3:51 PM,

Re: Embedding Guile with sandboxing

2015-11-22 Thread Christopher Allan Webber
Matthew Keeter writes: > I’m currently embedding Python in a C / C++ application that evaluates > user-provided scripts. > > Obviously, this is terribly unsafe: user-provided scripts can execute > arbitrary malicious actions, and there’s no good way to sandbox Python > in a desktop context. > > If

Re: Embedding Guile with sandboxing

2015-11-22 Thread Arne Babenhauserheide
Am Samstag, 21. November 2015, 13:35:12 schrieb Matthew Keeter: > If I were to replace Python with Guile, is there a way to sandbox it so that > arbitrary (perhaps > malicious) user-provided scripts can be run safely? The languages which try to do that are Java and Javascript, and they have sever

Re: Embedding Guile with sandboxing

2015-11-21 Thread Thompson, David
On Sat, Nov 21, 2015 at 1:35 PM, Matthew Keeter wrote: > I’m currently embedding Python in a C / C++ application that evaluates > user-provided scripts. > > Obviously, this is terribly unsafe: user-provided scripts can execute > arbitrary malicious actions, > and there’s no good way to sandbox P

Re: Embedding Guile with sandboxing

2015-11-21 Thread Pascal J. Bourguignon
Matthew Keeter writes: > I’m currently embedding Python in a C / C++ application that evaluates > user-provided scripts. > > Obviously, this is terribly unsafe: user-provided scripts can execute > arbitrary malicious actions, > and there’s no good way to sandbox Python in a desktop context. > >

Embedding Guile with sandboxing

2015-11-21 Thread Matthew Keeter
I’m currently embedding Python in a C / C++ application that evaluates user-provided scripts. Obviously, this is terribly unsafe: user-provided scripts can execute arbitrary malicious actions, and there’s no good way to sandbox Python in a desktop context. If I were to replace Python with Guile