On Mon, Feb 25, 2013 at 4:53 PM, Stefan Krastanov
<krastanov.ste...@gmail.com> wrote:
> concerning the prime notation: lambdify works by printing out your
> code, changing some imports and some names and then feeding it to
> "eval". All of it is just string operations. Not only it will choke on
> quotes, it can cause security holes if you hide malicious code in the
> name of the symbol.

Can we fix this by limiting what eval has access to during this part
of the operation? (i.e. giving it a safe sandbox)?

-- 
You received this message because you are subscribed to the Google Groups 
"sympy" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sympy+unsubscr...@googlegroups.com.
To post to this group, send email to sympy@googlegroups.com.
Visit this group at http://groups.google.com/group/sympy?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to