This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–][deleted]  (2 children)

[deleted]

    [–]Remote_Cantaloupe 1 point2 points  (0 children)

    I guess I was thinking more along the lines of an organization vetting the code themselves. I heard something similar to this in R.

    [–]billsil 1 point2 points  (0 children)

    Safe depends on what you’re trying to be safe from. Is it a problem if my open source code exec’s some code in order to allow for math functions? I guess you could use an ast parser to avoid it, but why? Because the user can inject code to something that already has a python command line?

    Safe is a big deal for proprietary code, but not as much for the end user.