--
You received this message because you are subscribed to the Google Groups "Jep Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jep-project...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/jep-project/bef516bc-ce4d-40fc-93bc-c854f2dc6943%40googlegroups.com.
Hi, Ben and I have discussed this in the past but never implemented anything. We have talked about ways to limit specific modules if desired, but again, haven't implemented anything. I'm not aware of anyone else building a secure sandbox on top of Jep. You can somewhat secure Java through the usage of a restricted classloader, but there's nothing at present in Jep to restrict Python execution.
On Wed, Mar 4, 2020, 12:44 PM Kacper Bernat <locz...@gmail.com> wrote:
Hello everybody,--
I've looked back and forth your documentation and I couldn't answer clearly to myself If there is any vulnerable code filter in runtime for this sandbox.
Just to clarify, my application(core stands on Java) allows user write own Python expressions. Recently I've realized that this feature is also able to execute harmful code like passing system commands, or system file operations.
Corresponding user code expression control is available in Groovy Sandbox http://groovy-sandbox.kohsuke.org/ (GroovyValueFilter class). Through this I'm able to whitelist compiled classes, execution of any beyond this whitelist is blocked.
Is there any similar implementation in jep?
Thanks in advance.
You received this message because you are subscribed to the Google Groups "Jep Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jep-p...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to jep-project...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/jep-project/dfa4c793-3978-4f71-920f-eb2312e25f85%40googlegroups.com.